XSS Bypass

Analysis on malware imposing as adult content of Nepali celebrity
Venus Chhantel
March 20, 2023

Analysis on malware imposing as adult content of Nepali celebrity

Table Of Contents Background Analysis MITRE ATT&CK TTP Further Findings Indicator of Compromise (IoC) Recommendations Background In the recent month, there is misinformation circulating concerning leaks of private video of Nepali female celebrities.

Read More
Threat Hunting with Windows Event Logs
Simran Karki
March 9, 2023

Threat Hunting with Windows Event Logs

Table Of Contents Introduction Event log structure in windows About Tools Logon Activity Groups Account Logon Enumeration Remote Desktop Connection (RDP) Network Share Schedule Tasks Services PowerShell WMI Removable Devices Log Clearing Detection About SayCure Hunting Approaches with SayCure Failed Logins Large numbers of failed logins on a single source within a small number of times.

Read More
Analysis on Stock Trading Nepal malware campaign
Venus Chhantel
March 6, 2023

Analysis on Stock Trading Nepal malware campaign

Table Of Contents Background Analysis Detection Through SayCure Indicator of Compromise Further Findings Recommendations Background In the recent event of time, there has been increase in scam and malware incidents in Nepal.

Read More
LogPoint and its SOAR
Bishesh Shrestha
March 1, 2023

LogPoint and its SOAR

Table Of Contents LogPoint Introduction What is SOAR? Detection Installation Use case and trigger Playbooks Playbook Trigger (Automation) Conclusion If you are into the cyber world then you probably have heard of SIEM.

Read More
MSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide
Aaditya Khati
January 1, 2023

MSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide

Table Of Contents Introduction About us About CyberRisk Alliance Introduction CryptoGen Nepal is listed as Top 250 MSSP.

Read More
MEGA's Unlimited Cloud Storage Vulnerability
Nirmal Dahal
November 17, 2022

MEGA's Unlimited Cloud Storage Vulnerability

Background Back in June 2022, I found a flaw in the MEGA cloud storage system that let me store more data than they permit for free accounts.

Read More
Arithmetic Vulnerabilities in Smart Contracts
Aayushman Thapa Magar
November 4, 2022

Arithmetic Vulnerabilities in Smart Contracts

Forword This is fourth in a series of articles on vulnerabilities that smart contracts are susceptible to.

Read More