Posts

Showing posts with the label #CyberDudeBivash #FilelessMalware #ThreatIntel #CyberSecurity #InfoSec #EDR #ThreatHunting #BlueTeam #SVG #MalwareAnalysis

Latest Cybersecurity News

Digital Pirates: How Russia, China, and Cyber-Gangs Can Hijack a Supertanker and Collapse Global Trade

Image
          🌍 Geopolitical & OT Security Analysis           Digital Pirates: How Russia, China, and Cyber-Gangs Can Hijack a Supertanker and Collapse Global Trade         By CyberDudeBivash • October 03, 2025 • Strategic Threat Report         cyberdudebivash.com |       cyberbivash.blogspot.com           Disclosure: This is a strategic analysis for leaders in government, defense, and critical infrastructure sectors. It contains affiliate links to relevant security solutions and training. Your support helps fund our independent research.   Executive Briefing: Table of Contents       Chapter 1: The 21st Century Chokepoint — A New Era of Piracy     Chapter 2: The Floating Datacenter — A Supertanker's Attack Surface     Chapter 3: The Kill Chain — From a Phished Captain to a Hijacked Rudde...

Fileless Malware Evasion: Analyzing How PureMiner Uses SVG Vector Graphics for Initial Access and Data Theft.

Image
        Fileless Malware Evasion: Analyzing How PureMiner Uses SVG Vector Graphics for Initial Access and Data Theft     By CyberDudeBivash • September 29, 2025, 4:05 PM IST • Threat Intelligence Report   In the relentless cat-and-mouse game of cybersecurity, attackers are constantly innovating to bypass our defenses. We are now tracking a new, highly evasive campaign that combines two powerful techniques: **fileless malware** and a novel initial access vector using **Scalable Vector Graphics (SVG) images**. The malware, which we have dubbed **PureMiner**, is a sophisticated information stealer that executes entirely in memory, leaving almost no trace on the victim's hard drive. Its name appears to be a deliberate misdirection; its primary goal is not cryptomining, but the exfiltration of credentials and session tokens. This report provides a deep-dive technical analysis of this new threat, detailing the kill chain from a simple image file to ...