cybersecurity-incident

Preview image for a blog post

Phishing Link Click: Unveiling the Technical Cascade of a Cyber Attack

Deep dive into the technical aftermath of clicking a phishing link, from immediate compromise to advanced persistent threats and DFIR strategies.
Preview image for a blog post

eScan Antivirus Update Infrastructure Breached: Multi-Stage Malware Delivered via Supply Chain Attack

eScan's update servers compromised, delivering multi-stage malware to enterprise and consumer systems via a sophisticated supply chain attack.