credential-harvesting

Preview image for a blog post

Deconstructing the Facebook Friend Post Scam: A Technical Deep Dive into Account Compromise & Phishing Vectors

Technical analysis of common Facebook friend post scams, detailing attack vectors, credential harvesting, and advanced forensic investigation.
Preview image for a blog post

SANDWORM_MODE Unleashed: Malicious npm Packages Steal Crypto Keys, CI Secrets, and API Tokens in a Shai-Hulud-like Supply Chain Attack

Active npm supply chain worm, SANDWORM_MODE, harvests crypto keys, CI secrets, and API tokens, demanding urgent developer vigilance.
Preview image for a blog post

Phishing Link Click: Unveiling the Technical Cascade of a Cyber Attack

Deep dive into the technical aftermath of clicking a phishing link, from immediate compromise to advanced persistent threats and DFIR strategies.