Obsidian Impersonation Phishing Campaign

Summary Threat actors allegedly have started using combination of GoogleAds and SEO Poisoning to trick users, reroute them to the phishing websites and download trojanized version of Obsidian.It is being recently reported on Obsidian subreddit about one of the such fake websites threat actors started abusing. What is Obsidian? Obsidian is a personal knowledge base … Read more

Cybersecurity Podcasts

When we talk about sources that keep us updated on security trends and news, we often mention cybersecurity blogs. However, many people often overlook another excellent source of knowledge — podcasts. Personally, I prefer to listen to podcasts while driving or during long walks, as I can focus on 1-1.5 hours of content. There are … Read more

Why do you need automation?

It is quite an obvious question, right? Automation is a key component of any company from any industry anywhere in the world. It is all started with Henry Ford’s assembly line in 1913, which revolutionized mass production. Information Technology and Cybersecurity essentially very similar to assembly line, where you deliver certain service or product to … Read more

Videogames

I LOVE video games. Actually, video games is something that brought me in to the world of information technologies and eventually, cybersecurity. Everything have started from self-hosting Counter-Strike 1.6 game servers for the friends and friends of friends. Every step was a certain challenge at that time: config files, network, NATing, ports, buying static IP … Read more

Anxun Leak Notes

Hi folks, In this post I want to share my findings from the recent infamous Anxun Leak, in particular, from the chat logs. Some overview and briefInitial Source of Leak – https://github.com/I-S00NCompany Website – http://www.i-soon.netCompany Name – Shanghai Anxun Information Technology Co.Company Information – https://pitchbook.com/profiles/company/433635-85Data Analysis and Highlights – https://github.com/hyde1337/anxun-isoon-leaks Provider of information technology security … Read more

What is (Cyber) Threat Intelligence?

I want to start sharing my thoughts on Threat Intelligence as a domain. Please don’t take my thoughts as only one truth. I could be wrong in details, but my notes should generally be close to reality. From participating in discussions, listening to others, reading group chats, and commenting on social media, many people misunderstand … Read more