XSS Bypass
Analysis on malware imposing as adult content of Nepali celebrity
Table Of Contents Background Analysis MITRE ATT&CK TTP Further Findings Indicator of Compromise (IoC) Recommendations Background In the recent month, there is misinformation circulating concerning leaks of private video of Nepali female celebrities.
Read MoreThreat Hunting with Windows Event Logs
Table Of Contents Introduction Event log structure in windows About Tools Logon Activity Groups Account Logon Enumeration Remote Desktop Connection (RDP) Network Share Schedule Tasks Services PowerShell WMI Removable Devices Log Clearing Detection About SayCure Hunting Approaches with SayCure Failed Logins Large numbers of failed logins on a single source within a small number of times.
Read MoreAnalysis on Stock Trading Nepal malware campaign
Table Of Contents Background Analysis Detection Through SayCure Indicator of Compromise Further Findings Recommendations Background In the recent event of time, there has been increase in scam and malware incidents in Nepal.
Read MoreLogPoint and its SOAR
Table Of Contents LogPoint Introduction What is SOAR? Detection Installation Use case and trigger Playbooks Playbook Trigger (Automation) Conclusion If you are into the cyber world then you probably have heard of SIEM.
Read MoreMSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide
Table Of Contents Introduction About us About CyberRisk Alliance Introduction CryptoGen Nepal is listed as Top 250 MSSP.
Read MoreMEGA's Unlimited Cloud Storage Vulnerability
Background Back in June 2022, I found a flaw in the MEGA cloud storage system that let me store more data than they permit for free accounts.
Read MoreArithmetic Vulnerabilities in Smart Contracts
Forword This is fourth in a series of articles on vulnerabilities that smart contracts are susceptible to.
Read More