Blog Post by Anish Bogati
Anish BogatiFeb 5, 2026 12:00:00 AM
From N-Days to Multiple Arch: Inside RondoDox’s Delivery Pipeline
Start ReadingAnish BogatiDec 8, 2025 12:00:00 AM
After React2Shell: Following the Attacker From Access to Impact
Start ReadingAnish BogatiAug 29, 2025 12:00:00 AM
Citrix Vulnerabilities Rising – When Gateways Give Way
Start ReadingAnish BogatiAug 6, 2025 12:00:00 AM
Akira in the Network: From SonicWall Access to Ransomware Deployment
Start ReadingAnish BogatiMay 9, 2025 12:00:00 AM
Tricked by trust: How OAuth and device code flows get abused
Start ReadingAnish BogatiApr 11, 2025 12:00:00 AM
From Exploit to Ransomware: Detecting CVE-2025-29824
Start ReadingAnish BogatiNov 18, 2024 12:00:00 AM
Exploring Strela Stealer: Initial Payload Analysis and Insights
Start ReadingAnish BogatiNov 7, 2024 12:00:00 AM
Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
Start ReadingAnish BogatiAug 23, 2023 12:00:00 AM
Emerging Threat: Defending Against 8base – Uncovering Their Arsenal and Crafting Responses
Start ReadingAnish BogatiJun 7, 2023 12:00:00 AM
MOVEit’s Zero Day: The File Transfer Turmoil
Start ReadingAnish BogatiMar 23, 2023 12:00:00 AM