top of page
Table of Content


EDR Freeze: In Depth Analysis of the Technique That Silences Endpoint
Learn how the EDR Freeze uses Windows Error Reporting to suspend EDR/AV processes, how to detect it, and what to do if you see it.
Akshay Jain
2 min read


EchoLeak (CVE-2025-32711): Deep Dive into the Zero-Click Copilot Prompt-Injection Vulnerability
CVE-2025-32711 (“EchoLeak”) is a critical zero click prompt injection in Microsoft 365 Copilot that could exfiltrate org secrets. Read the technical breakdown, detection rules, IR playbook and mitigation guidance.
Akshay Jain
3 min read


Inside the September 2025 npm Supply-Chain Attack
A phishing attack on a maintainer led to 18 npm packages shipping malware that hijacks browser wallet flows. Learn the timeline, IoCs of the npm supply chain attack 2025
Akshay Jain
2 min read


UNC6040 Salesforce Breach: Vishing Attack Breakdown & Defense Guide
Dive deep into the UNC6040 breach of Salesforce environments via vishing and fake Data Loader apps. Learn the attack chain, affected organizations, and proven detection and mitigation strategies.
Akshay Jain
4 min read


CVE-2025-53770 SharePoint Zero-Day: In-Depth Analysis, Detection & Defence
Explore CVE‑2025‑53770 ("ToolShell") a critical, unauthenticated RCE exploited in the wild against on-prem SharePoint. Understand how it works, real-world impact, detection rules, and remediation steps.
Akshay Jain
3 min read
bottom of page