Rishika DesaiHow Malware-Embedded Malicious Invoices and Purchase Orders Exploit Organizations (Part II)Here’s how malicious invoices and purchase orders exploit organizations and the attack process, from lead generation to system compromise.Oct 30Oct 30
Rishika DesaiHow Malware-Embedded Malicious Invoices and Purchase Orders Exploit Organizations (Part I)A post on cybercrime forum highlights some methods why industries are often targeted by malicious phishing emails, explained here.Oct 20Oct 20
Rishika DesaiBehind the Scenes: How Info-Stealing Malware Could Possibly Target Prominent YouTube AccountsDisclaimer: The information provided in this article is based on general knowledge and analysis of potential cybersecurity risks.Sep 29Sep 29
Rishika DesaiLeveraging Shodan for Proactive SecurityThis blog aims to empower those researchers with valuable OSINT techniques for ransomware hunting.May 14May 14
Rishika DesaiHacking and Sourcing X Accounts promoting Crypto Scams and NFTs: Techniques ExplainedNon-fungible tokens have taken modern cyberspace into a new realm of revolution. For those who need context, it is an online digital…Feb 17Feb 17
Rishika DesaiHackers Target Bug Bounty Hunters with Blackmail EmailsFor all the bug bounty hunters, please check your spam section, especially if you have generated a research email in…Dec 25, 2023Dec 25, 2023
Rishika DesaiThe Dark Side of AI: GPTs as a New Weapon in the Cybercriminal ArsenalGPTs: A New Weapon in the Cybercriminal ArsenalNov 24, 2023Nov 24, 2023
Rishika DesaiLatest Major Data Breaches and How to Protect YourselfThe year 2023 has seen a steep rise in different cybersecurity attacks and data breaches, and it doesn’t seem to cease any time soon…Nov 17, 2023Nov 17, 2023
Rishika DesaiKey Learnings from Files Present on the C2 Server of an Infamous Infostealer MalwareHello readers, welcome to my 5th blog. This one tries to highlight how I got access to the log files present over a C2 server of an…Jul 19, 2023Jul 19, 2023
Rishika DesaiFrom Novice to Expert: Essential Cyber Threat Intelligence Resources for Every LevelThere are a lot of resources present, but finding the right one is important. Without the right course, the subject just seems to keep…Jul 2, 20231Jul 2, 20231