top of page
Table of Content


SonicWall Backup Breach
SonicWall confirmed an unauthorized access to MySonicWall cloud backups affecting all customers. Learn the technical details, risks, detection rules, IR workflow, and remediation checklist for the sonicwall breach.
Akshay Jain
3 min read


EDR Freeze: In Depth Analysis of the Technique That Silences Endpoint
Learn how the EDR Freeze uses Windows Error Reporting to suspend EDR/AV processes, how to detect it, and what to do if you see it.
Akshay Jain
2 min read


EchoLeak (CVE-2025-32711): Deep Dive into the Zero-Click Copilot Prompt-Injection Vulnerability
CVE-2025-32711 (“EchoLeak”) is a critical zero click prompt injection in Microsoft 365 Copilot that could exfiltrate org secrets. Read the technical breakdown, detection rules, IR playbook and mitigation guidance.
Akshay Jain
3 min read


Inside the September 2025 npm Supply-Chain Attack
A phishing attack on a maintainer led to 18 npm packages shipping malware that hijacks browser wallet flows. Learn the timeline, IoCs of the npm supply chain attack 2025
Akshay Jain
2 min read


UNC6040 Salesforce Breach: Vishing Attack Breakdown & Defense Guide
Dive deep into the UNC6040 breach of Salesforce environments via vishing and fake Data Loader apps. Learn the attack chain, affected organizations, and proven detection and mitigation strategies.
Akshay Jain
4 min read
bottom of page