Cyber security research

The security project

Latest Blog

LotL attacks occur when threat actors leverage tools that are already available in the operating system (especially Windows environments) to perform malicious actions.

🕵️‍♂️ Living Off the Land Attacks: The Silent Hackers Hiding in Plain Sight

🚨 Introduction In today’s evolving threat landscape, one of the most deceptive forms of attack is the Living off the Land (LotL) technique. Unlike traditional cyberattacks that rely on malware or external tools, LotL attacks use native system utilities and pre-installed software to carry out…

Pig butchering” is a type of long-con cryptocurrency fraud. Scammers establish emotional or financial trust with victims (often via social media or dating apps), “fatten them up” with promises of investment gains, and then “slaughter” them by stealing large sums of money once they've invested into a fake crypto exchange or wallet.

🚨 U.S. Sanctions Cloud Provider ‘Funnull’ Over Pig Butchering Scams — How CyberVolt Security Shields Your Business from Similar Threats

U.S. Treasury Department sanctioned Funnull Technology Inc. In a recent landmark action, the U.S. Treasury Department sanctioned Funnull Technology Inc., a cloud infrastructure provider accused of enabling large-scale crypto scams — notably the insidious “pig butchering” fraud schemes. These scams…

Log analysis involves collecting and examining log data — digital records of activity on a system or network.

How Log Analysis Can Help Prevent Hacking – Real-World Scenarios and Strategies

🔍 How Security Log Analysis Helps Prevent Data Breaches and Insider Threats In today’s digital threat landscape, log analysis is one of the most powerful tools cybersecurity teams have at their disposal. By systematically collecting and analyzing logs from systems,…

Apple Blocks $9 Billion in Fraud: What It Means for the Future of App Security — And How CyberVolt Can Help

Apple Blocks $9 Billion in Fraud: What It Means for the Future of App Security — And How CyberVolt Can Help

In an era where digital threats evolve faster than ever, tech giants like Apple are taking significant steps to protect their ecosystems. Recently, Apple announced it has blocked over $9 billion in fraudulent transactions over the past five years, including…

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The packages, published under three different accounts, come with…

Headline about U.S. charging 16 individuals linked to DanaBot malware as developers accidentally infect their own systems

U.S. charged 16 individuals tied to DanaBot — DanaBot Developers Infected Their Own Systems — A Cautionary Tale in Cybercrime

DanaBot Developers Infected Their Own Systems — A Cautionary Tale in Cybercrime Overview In an ironic twist that’s catching the cybersecurity world’s attention, the developers behind the infamous DanaBot malware were found to have accidentally infected their own systems, exposing…

Credential Stuffing Attack illustration showing automated bots using stolen usernames and passwords to gain unauthorized access to user accounts across multiple websites.

What Is Credential Stuffing?

What Is Credential Stuffing? How It Works and How to Prevent It Credential stuffing is one of the most common and dangerous forms of cyberattacks today. If you’ve ever reused a password across multiple accounts, you could be at risk….

Cross-Site Request Forgery (CSRF) attack illustration showing how a hacker exploits user sessions to perform unauthorized actions on web applications.

What is Cross-Site Request Forgery (CSRF) and How to Protect Your Website?

Cross-Site Request Forgery (CSRF) is a type of cyberattack that tricks a victim into performing unwanted actions on a web application in which they are authenticated. Often referred to as one-click attacks, session riding, or silent attacks, CSRF exploits the…

Buffer Overflow

Mastering Buffer Overflow: Unlocking the Secrets to Secure Software Development

Buffer overflow is one of the most notorious vulnerabilities in the world of cybersecurity, and it has been responsible for many high-profile security breaches. Understanding how buffer overflow works, its potential risks, and how to prevent it is essential for…

what is the blue screen in widows

Understanding Memory Corruption: Causes, Impact, and Protection

Memory corruption is a serious vulnerability in software and hardware systems that can have devastating consequences. It occurs when data in a program’s memory is unintentionally modified, which can lead to unpredictable behavior, crashes, security flaws, and even complete system…