Skip to content
28, May 2025
  • Facebook
  • X
  • LinkedIn

  • Home
  • SOC
    • SIEM
    • Wazuh
  • DFIR
    • Incident Response
    • Digital Forensics
    • Malware Analysis
  • News
    • Ransomware
    • Cyber Attack
    • Data Leak
    • Dark Web

Category: Malware Analysis

  • Home
  • Malware Analysis
Lumma Stealer: The.PIF File Path Execution and Data Theft
4 min read 0
  • Malware Analysis
  • Uncategorized

Lumma Stealer: The.PIF File Path Execution and Data Theft

  • Redowan Zaman Anik
  • February 9, 2025
Lumma Stealer is a sophisticated information-stealing malware that primarily targets credentials, browser data, and system information. One of the key…
PECmd: A Powerful Tool for DFIR and Incident Response
3 min read 0
  • DFIR
  • Digital Forensics
  • Incident Response
  • Malware Analysis

PECmd: A Powerful Tool for DFIR and Incident Response

  • engrarifcce@gmail.com
  • February 3, 2025
In digital forensics and incident response (DFIR), the ability to analyze artifacts efficiently is critical to uncovering malicious activity. One…
Mohammad Makchudul Alam

Mohammad Makchudul Alam

Information Security Researcher

Md Samiul Islam

Md Samiul Islam

Defensive Security Researcher

Md Redowan Zaman

Md Redowan Zaman

Cyber Threat Intelligence Specialist

Sabrein Serag El Din

Sabrein Serag El Din

Cyber Threat Intelligence Analyst

Copyright © 2025 Theme: Terminal Blog By Adore Themes.