Author name: Saleh Alshuraim

North Korea-Linked Hackers Have Stolen Over $2B in Crypto in 2025 — What Happened and How to Defend

North Korea-linked hackers have continued to target the cryptocurrency ecosystem in 2025, and blockchain forensics firms say the tally is already staggering. Analysts at Elliptic report that DPRK-connected actors have stolen over $2 billion in crypto this year, contributing to a multi-year pattern of state-linked thefts that now total several billion dollars. The heist against […]

North Korea-Linked Hackers Have Stolen Over $2B in Crypto in 2025 — What Happened and How to Defend Read More »

Learn how to analyze malware safely using sandbox environments. Step-by-step guide for cybersecurity experts and SOC teams to test malware securely.

How to Analyze Malware Safely Using a Sandbox (Step-by-Step Guide)

Malware analysis is one of the most important skills in cybersecurity. But handling malware without proper isolation can lead to system compromise — or worse, network-wide infection. That’s where sandboxing comes in. A malware sandbox is a secure, controlled environment where you can safely detonate and observe malicious files without risking your real system. This

How to Analyze Malware Safely Using a Sandbox (Step-by-Step Guide) Read More »

ethical OSINT investigation guide with tools and framework

How to Perform OSINT Investigations (Ethically and Effectively)

What Is OSINT? Open Source Intelligence (OSINT) is the process of collecting and analyzing publicly available information to support cybersecurity, investigations, and decision-making. It’s a cornerstone skill for ethical hackers, SOC analysts, digital forensics experts, and law enforcement. Unlike hacking or exploitation, OSINT relies only on public data — no system intrusion or illegal access.

How to Perform OSINT Investigations (Ethically and Effectively) Read More »

A practical threat-hunting playbook using MITRE ATT&CK. Learn how to map telemetry, build hunts, write detection queries, and measure SOC success.

Threat Hunting with MITRE ATT&CK: A Practical Playbook for SOC Teams

Why use MITRE ATT&CK for threat hunting? MITRE ATT&CK provides a common language for adversary tactics and techniques. For threat hunting, ATT&CK helps teams prioritize hunts, map telemetry gaps, and create repeatable detection playbooks that tie directly to real-world attacker behavior. Benefits: Prerequisites: what you need before you hunt Step-by-step playbook (repeatable) 1) Select &

Threat Hunting with MITRE ATT&CK: A Practical Playbook for SOC Teams Read More »

Steam malware 2025 infects verified games like BlockBlasters and Chemia, stealing $150K in crypto.

Steam Malware Outbreak 2025: Gamers Lose Over $150,000 in Crypto After Playing Infected Titles

The Steam malware outbreak of 2025 has shocked the gaming world — two popular games, BlockBlasters and Chemia, were discovered to contain hidden malware that stole cryptocurrency and sensitive user data. Cybersecurity experts warn that this may be one of the most dangerous supply-chain compromises in gaming history. What Happened In September 2025, reports surfaced

Steam Malware Outbreak 2025: Gamers Lose Over $150,000 in Crypto After Playing Infected Titles Read More »

Discord data breach 2025 — hacker steals user data, emails, and scanned IDs through third-party vendor

Discord Data Breach Exposes User Info and Scanned IDs — Here’s What You Need to Know

The popular chat platform Discord has confirmed a data breach involving a third-party customer service provider that exposed sensitive user information — including names, email addresses, and even scanned government IDs. The breach, discovered in late September 2025, has raised serious concerns about vendor security and the growing risk of third-party supply chain breaches in

Discord Data Breach Exposes User Info and Scanned IDs — Here’s What You Need to Know Read More »

Hacker stealing digital folders from a cabinet representing data theft — cybersecurity illustration in dark blue and black colors.

CometJacking Attack: How Hackers Are Turning AI Browsers Against Users in 2025

What Is the CometJacking Attack? In October 2025, researchers uncovered a dangerous new exploit called CometJacking, which abuses AI-powered browsers such as Perplexity AI to steal sensitive information from unsuspecting users. Unlike traditional phishing, where attackers trick victims into entering credentials, CometJacking enables attackers to inject malicious content into AI browser workflows — allowing them

CometJacking Attack: How Hackers Are Turning AI Browsers Against Users in 2025 Read More »

MITRE ATT&CK update 2025 v17 v18 detection overhaul

MITRE ATT&CK v18 & v17 Updates: What’s New & Why It Matters in 2025

The Latest on MITRE ATT&CK in 2025 The MITRE ATT&CK framework continues evolving. Its v17 update (released April 2025) introduced expanded platform coverage, new techniques, and improved guidance for defenders. Now, attention turns to ATT&CK v18, expected this October 2025, which promises a major shift: a revamp of detection modeling to better align with real-world

MITRE ATT&CK v18 & v17 Updates: What’s New & Why It Matters in 2025 Read More »

Salesforce data breach 2025

Nearly 1 Billion Salesforce Records Claimed Stolen in Sophisticated Vishing Attack

The Salesforce data breach 2025 is already being called one of the most significant SaaS security incidents in history. A hacker group known as Scattered LAPSUS$ Hunters claims to have exfiltrated nearly one billion customer records after a wave of vishing and social engineering attacks targeting Salesforce clients. While Salesforce has confirmed it is investigating

Nearly 1 Billion Salesforce Records Claimed Stolen in Sophisticated Vishing Attack Read More »

The Rise of AI-Driven Cyber Threats: Zero-Day AI Attacks and How to Defend Against Them

Artificial intelligence has rapidly transformed how businesses operate, from automating processes to enabling real-time decision making. But the same technology is being weaponized by cybercriminals. Security experts now warn about a new wave of AI-driven cyberattacks — including zero-day AI exploits, where autonomous AI agents can find and abuse vulnerabilities before defenders even know they

The Rise of AI-Driven Cyber Threats: Zero-Day AI Attacks and How to Defend Against Them Read More »

Scroll to Top