DeXpose Blog

Researches, News, and more

Categories

Filters
Reset

Top Articles

PureLogs malware analysis with data theft techniques

Introduction PureLogs is an advanced information stealer designed to extract credentials, session tokens, and system details while employing strong anti-analysis techniques. It encrypts stolen data using AES-256 before sending it to a remote Command &…

Undetected .NET PE Injector Found on Archive Org

Introduction On February 11, 2025, Filescan.io shared a troubling discovery: a 6-month-old .NET PE injector had remained undetected on Archive.org, a platform widely used for archiving web content. The file was flagged as clean, allowing it to remain accessible for months.…

How Dark web Monitoring Protects Your business

Dark web monitoring is a crucial step for businesses to safeguard their sensitive data. This process involves scanning the dark web for compromised information, such as stolen credentials and proprietary data. Data breaches can have…

In-Depth Technical Analysis of Lumma Stealer

Introduction Lumma is a sophisticated information stealer, written in C/C++, that has been active in the wild since at least August 15, 2022. The first publicly identified sample appeared on Malware Bazaar on December 20,…

Egyptian Organizations Darkweb Exposure Report

Are you wondering what kind of information about the Egyptian organizations the Darkweb has? As we all remember, the last few years were bad for many organizations regarding hacking and cyber threats. Digital shadows team…