top of page
Table of Content


Valkyrie Stealer: Anatomy of a Modern Infostealer
Discover how Valkyrie Stealer malware operates, its core capabilities, attack workflow, real-world impact, sample detection rules, and defensive best practices to protect systems and users. Learn from deep technical insights and blue team guidance for holistic security.
Akshay Jain
3 min read


The Shai-Hulud 2.0 npm Worm: A Deep Dive into One of the Largest Supply Chain Attacks Ever
Explore the Shai-Hulud 2.0 npm worm: how this self-replicating malware compromised hundreds of npm packages, exfiltrated credentials, and became one of the most impactful software supply chain attacks of 2025. Learn detection rules, attack workflow, real-world case studies, and effective mitigation strategies for developers and security teams.
Akshay Jain
3 min read


React2Shell Critical Vulnerability (CVE-2025-55182)
React2Shell (CVE-2025-55182) is a critical CVSS 10.0 remote code execution vulnerability in React Server Components and Next.js. Learn how the React2Shell exploit works, which versions are affected, how Chinese threat actors are abusing it in the wild, and get practical detection, mitigation, and incident-response guidance for your React and Next.js applications.
Akshay Jain
4 min read


RedTiger Infostealer: How a Red Team Tool Became a Gamer Targeting Malware
RedTiger an open source red team toolkit has been repurposed into an infostealer that targets Discord, browsers and crypto wallets. Read the technical analysis, IoCs, detection rules and mitigation guidance.
Akshay Jain
3 min read


SonicWall Backup Breach
SonicWall confirmed an unauthorized access to MySonicWall cloud backups affecting all customers. Learn the technical details, risks, detection rules, IR workflow, and remediation checklist for the sonicwall breach.
Akshay Jain
3 min read
bottom of page