Blogs

As cybersecurity professionals, we encounter many cybersecurity issues, vulnerabilities, and trending threats on a daily basis. In an effort to share this knowledge with those who may find it helpful, we frequently post blogs on these topics. Our goal is to provide valuable information to those who are searching for it.

Hunting Down Remcos RAT: How CrowdStrike Update Mishaps Can Reveal Hidden Threats
Simran Karki
July 22, 2024

Hunting Down Remcos RAT: How CrowdStrike Update Mishaps Can Reveal Hidden Threats

Table Of Contents Background Threat Landscape Threat Hunting Importance of Hypothesis in Threat Hunting Methodologies of Hypothesis Based hunting Plan Document IOCs Gathering TTPs Information MITRE Mapping Behavioral Analysis Investigate Mitigate Conclusion Background Recently, the cybersecurity community faced a significant challenge worldwide due to a BSOD (Blue Screen of Death) error caused by a CrowdStrike update.

Read More
Transaction Order Dependence Vulnerabilities on Smart Contracts
October 4, 2022

Transaction Order Dependence Vulnerabilities on Smart Contracts

Table Of Contents Foreword Table of Contents Transaction Order Dependence Overview Introduction Ethereum mempool Security Risk Example Identification Techniques Mitigation Measures References Foreword This work is first in the series of articles on vulnerabilities that smart contracts are susceptible to.

Read More
leveraging the SQL Injection to Execute the XSS by Evading CSP
Nirmal Dahal
July 12, 2022

leveraging the SQL Injection to Execute the XSS by Evading CSP

Although it sounds silly, I am dumb enough to do this.

Read More
International standard for information security (ISO) - 27001
April 17, 2022

International standard for information security (ISO) - 27001

Table Of Contents ISO 27001 Introduction About ISMS Needs of ISMS How ISO 27001 work?

Read More
A Pentester's Prespective: SWIFT Vulnerability Assessment
April 8, 2022

A Pentester's Prespective: SWIFT Vulnerability Assessment

Table Of Contents Local SWIFT Infrastructure Operators Operators PCs Data Exchange Layer Middleware Server Architecture Assessment Approaches Approach - I Approach - II What should a tester look for while using this approach?

Read More
SWIFT CSP v2022 assessment
April 5, 2022

SWIFT CSP v2022 assessment

Table Of Contents SWIFT CSP v2022 assessment Why Is It Required?

Read More
XSS on Samy Pl
Nirmal Dahal
June 19, 2019

XSS on Samy Pl

In this article, I am going to explain a security issue that I found on a web site which is famous within the information security researchers.

Read More
CVE-2021-3258 | S-XSS to Defacement & Account Takeover [Q2A Themes]
Nirmal Dahal
August 21, 2017

CVE-2021-3258 | S-XSS to Defacement & Account Takeover [Q2A Themes]

In this article, I am going to share a POC (Proof of Concept) on a vulnerability that I found on a popular Forum Management System by Q2A.

Read More
Facebook SVG Locky Ransomware Analysis
Nirmal Dahal
November 22, 2016

Facebook SVG Locky Ransomware Analysis

This Is What Actually Facebook’s SVG Malware Is Doing. We Had Used W3School’s IDE While Analyzing The Malicious SVG File.

Read More