top of page
Table of Content


RedTiger Infostealer: How a Red Team Tool Became a Gamer Targeting Malware
RedTiger an open source red team toolkit has been repurposed into an infostealer that targets Discord, browsers and crypto wallets. Read the technical analysis, IoCs, detection rules and mitigation guidance.
Akshay Jain
3 min read


SonicWall Backup Breach
SonicWall confirmed an unauthorized access to MySonicWall cloud backups affecting all customers. Learn the technical details, risks, detection rules, IR workflow, and remediation checklist for the sonicwall breach.
Akshay Jain
3 min read


EDR Freeze: In Depth Analysis of the Technique That Silences Endpoint
Learn how the EDR Freeze uses Windows Error Reporting to suspend EDR/AV processes, how to detect it, and what to do if you see it.
Akshay Jain
2 min read


EchoLeak (CVE-2025-32711): Deep Dive into the Zero-Click Copilot Prompt-Injection Vulnerability
CVE-2025-32711 (“EchoLeak”) is a critical zero click prompt injection in Microsoft 365 Copilot that could exfiltrate org secrets. Read the technical breakdown, detection rules, IR playbook and mitigation guidance.
Akshay Jain
3 min read


Inside the September 2025 npm Supply-Chain Attack
A phishing attack on a maintainer led to 18 npm packages shipping malware that hijacks browser wallet flows. Learn the timeline, IoCs of the npm supply chain attack 2025
Akshay Jain
2 min read
bottom of page