Forem

Satyam Rastogi profile picture

Satyam Rastogi

404 bio not found

Joined Joined on 
OpenEMR 38-Vulnerability Chain: Patient Data Exfil & Tampering
Cover image for OpenEMR 38-Vulnerability Chain: Patient Data Exfil & Tampering

OpenEMR 38-Vulnerability Chain: Patient Data Exfil & Tampering

Comments
5 min read
Silk Typhoon Extradition: State-Sponsored APT Operator Accountability & Persistence TTPs
Cover image for Silk Typhoon Extradition: State-Sponsored APT Operator Accountability & Persistence TTPs

Silk Typhoon Extradition: State-Sponsored APT Operator Accountability & Persistence TTPs

Comments
6 min read
Zimbra XSS at Scale: Exploiting 10K+ Servers in Enterprise Email
Cover image for Zimbra XSS at Scale: Exploiting 10K+ Servers in Enterprise Email

Zimbra XSS at Scale: Exploiting 10K+ Servers in Enterprise Email

Comments
5 min read
Tropic Trooper: Home Router Exploitation & Japanese Infrastructure Targeting
Cover image for Tropic Trooper: Home Router Exploitation & Japanese Infrastructure Targeting

Tropic Trooper: Home Router Exploitation & Japanese Infrastructure Targeting

Comments
6 min read
Apple Notification Services Bug: Forensic Data Retention in Signal
Cover image for Apple Notification Services Bug: Forensic Data Retention in Signal

Apple Notification Services Bug: Forensic Data Retention in Signal

Comments
5 min read
France Titres Breach: Government Document Authority Targeted
Cover image for France Titres Breach: Government Document Authority Targeted

France Titres Breach: Government Document Authority Targeted

Comments
5 min read
KelpDAO $290M Heist: Lazarus DeFi Exploitation Playbook
Cover image for KelpDAO $290M Heist: Lazarus DeFi Exploitation Playbook

KelpDAO $290M Heist: Lazarus DeFi Exploitation Playbook

Comments
6 min read
FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation
Cover image for FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation

FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation

1
Comments 1
5 min read
April 2026 Threat Roundup: Chrome RCE, Supply Chain Targeting & Satellite Infrastructure
Cover image for April 2026 Threat Roundup: Chrome RCE, Supply Chain Targeting & Satellite Infrastructure

April 2026 Threat Roundup: Chrome RCE, Supply Chain Targeting & Satellite Infrastructure

Comments
6 min read
DraftKings Credential Trafficking: Post-Plea Monetization & Detection Gaps
Cover image for DraftKings Credential Trafficking: Post-Plea Monetization & Detection Gaps

DraftKings Credential Trafficking: Post-Plea Monetization & Detection Gaps

Comments
6 min read
NVD Enrichment Triage: Attacker's Advantage in Unpatched CVE Gaps
Cover image for NVD Enrichment Triage: Attacker's Advantage in Unpatched CVE Gaps

NVD Enrichment Triage: Attacker's Advantage in Unpatched CVE Gaps

Comments
6 min read
6-Year Turkish Ransomware Campaign: SMB Targeting & Detection Gaps
Cover image for 6-Year Turkish Ransomware Campaign: SMB Targeting & Detection Gaps

6-Year Turkish Ransomware Campaign: SMB Targeting & Detection Gaps

Comments
5 min read
Microsoft April 2026: 161 CVEs & Active SharePoint Zero-Day Exploitation
Cover image for Microsoft April 2026: 161 CVEs & Active SharePoint Zero-Day Exploitation

Microsoft April 2026: 161 CVEs & Active SharePoint Zero-Day Exploitation

Comments
4 min read
Basic-Fit Breach: Targeting SaaS Membership Platforms at Scale
Cover image for Basic-Fit Breach: Targeting SaaS Membership Platforms at Scale

Basic-Fit Breach: Targeting SaaS Membership Platforms at Scale

Comments
7 min read
PlugX RAT via Fake Claude: DLL Sideloading Supply Chain Attack
Cover image for PlugX RAT via Fake Claude: DLL Sideloading Supply Chain Attack

PlugX RAT via Fake Claude: DLL Sideloading Supply Chain Attack

Comments
7 min read
Rockwell Automation PLCs: 4,000 Exposed Devices & Iranian OT Targeting
Cover image for Rockwell Automation PLCs: 4,000 Exposed Devices & Iranian OT Targeting

Rockwell Automation PLCs: 4,000 Exposed Devices & Iranian OT Targeting

Comments
5 min read
Hims Breach: Exploiting Telehealth PHI for Extortion & Identity Fraud
Cover image for Hims Breach: Exploiting Telehealth PHI for Extortion & Identity Fraud

Hims Breach: Exploiting Telehealth PHI for Extortion & Identity Fraud

Comments
6 min read
LucidRook Lua Malware: Targeting NGOs & Academia in Taiwan
Cover image for LucidRook Lua Malware: Targeting NGOs & Academia in Taiwan

LucidRook Lua Malware: Targeting NGOs & Academia in Taiwan

Comments
6 min read
Contagious Interview: 1,700 Malicious Packages Across npm, PyPI, Go, Rust
Cover image for Contagious Interview: 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Contagious Interview: 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Comments
5 min read
Black Hat USA 2026: Critical Exploitation Trends & Attack Surface Evolution
Cover image for Black Hat USA 2026: Critical Exploitation Trends & Attack Surface Evolution

Black Hat USA 2026: Critical Exploitation Trends & Attack Surface Evolution

Comments
5 min read
TeamPCP European Commission Breach: 30 EU Entities Compromised
Cover image for TeamPCP European Commission Breach: 30 EU Entities Compromised

TeamPCP European Commission Breach: 30 EU Entities Compromised

Comments
5 min read
TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs
Cover image for TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

Comments
5 min read
Mexico AI-Assisted Government Breach: ChatGPT & Claude Attack TTPs
Cover image for Mexico AI-Assisted Government Breach: ChatGPT & Claude Attack TTPs

Mexico AI-Assisted Government Breach: ChatGPT & Claude Attack TTPs

Comments
5 min read
FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs
Cover image for FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs

FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs

Comments
5 min read
Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis
Cover image for Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis

Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis

Comments
5 min read
Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs
Cover image for Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

1
Comments
5 min read
Multi-Vector Convergence: SD-WAN, CVE, AI Attack TTPs March 2026
Cover image for Multi-Vector Convergence: SD-WAN, CVE, AI Attack TTPs March 2026

Multi-Vector Convergence: SD-WAN, CVE, AI Attack TTPs March 2026

Comments
5 min read
North Korean npm Package Attack: Pastebin C2 RAT TTPs Analysis
Cover image for North Korean npm Package Attack: Pastebin C2 RAT TTPs Analysis

North Korean npm Package Attack: Pastebin C2 RAT TTPs Analysis

1
Comments
5 min read
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs
Cover image for ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

Comments
6 min read
Hospital Ransomware: Healthcare Attack Chain Analysis
Cover image for Hospital Ransomware: Healthcare Attack Chain Analysis

Hospital Ransomware: Healthcare Attack Chain Analysis

1
Comments
5 min read
Cisco SD-WAN Zero-Day: 3-Year APT Campaign Analysis
Cover image for Cisco SD-WAN Zero-Day: 3-Year APT Campaign Analysis

Cisco SD-WAN Zero-Day: 3-Year APT Campaign Analysis

1
Comments
5 min read
UFP Technologies Medical Device Cyberattack: Healthcare Supply Chain TTPs
Cover image for UFP Technologies Medical Device Cyberattack: Healthcare Supply Chain TTPs

UFP Technologies Medical Device Cyberattack: Healthcare Supply Chain TTPs

Comments
6 min read
Lazarus Group Medusa Ransomware: APT38 Multi-Stage Attack Chain
Cover image for Lazarus Group Medusa Ransomware: APT38 Multi-Stage Attack Chain

Lazarus Group Medusa Ransomware: APT38 Multi-Stage Attack Chain

Comments
5 min read
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis
Cover image for CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

Comments
5 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion
Cover image for Shields Up Defense Tech: Red Team Attack Surface Expansion

Shields Up Defense Tech: Red Team Attack Surface Expansion

Comments
5 min read
Multi-Vector Attack Convergence: Healthcare Ransomware & ICS Surge
Cover image for Multi-Vector Attack Convergence: Healthcare Ransomware & ICS Surge

Multi-Vector Attack Convergence: Healthcare Ransomware & ICS Surge

Comments
5 min read
OpenClaw Supply Chain Attack: NPM Package Poisoning TTPs
Cover image for OpenClaw Supply Chain Attack: NPM Package Poisoning TTPs

OpenClaw Supply Chain Attack: NPM Package Poisoning TTPs

Comments
5 min read
Dell RecoverPoint CVE-2026-22769: UNC6201 Attack Chain Analysis
Cover image for Dell RecoverPoint CVE-2026-22769: UNC6201 Attack Chain Analysis

Dell RecoverPoint CVE-2026-22769: UNC6201 Attack Chain Analysis

Comments
5 min read
Dell Zero-Day Exploitation: Chinese APT Attack Chain Analysis
Cover image for Dell Zero-Day Exploitation: Chinese APT Attack Chain Analysis

Dell Zero-Day Exploitation: Chinese APT Attack Chain Analysis

Comments
5 min read
Multi-Vector Attack Convergence: Legacy Botnets, AI & Cloud Abuse
Cover image for Multi-Vector Attack Convergence: Legacy Botnets, AI & Cloud Abuse

Multi-Vector Attack Convergence: Legacy Botnets, AI & Cloud Abuse

Comments
5 min read
Multi-Vector Convergence: Outlook Add-Ins, Zero-Days & AI Malware
Cover image for Multi-Vector Convergence: Outlook Add-Ins, Zero-Days & AI Malware

Multi-Vector Convergence: Outlook Add-Ins, Zero-Days & AI Malware

Comments
5 min read
Multi-Vector Attack Convergence: Outlook, Zero-Days & AI Malware
Cover image for Multi-Vector Attack Convergence: Outlook, Zero-Days & AI Malware

Multi-Vector Attack Convergence: Outlook, Zero-Days & AI Malware

Comments
5 min read
loading...