Many security researchers, professional cybersecurity analysts and cybsec organizations realized great analyses on DiskKill (HermeticWiper), some of my favorite are...
Data and computer security
Data and computer security
Many times you hear about cybersecurity standards and many times you find yourself in a way to evaluate what you...
Kubernets and server-less applications would be the biggest next things to protect. So it would be a great idea to...
APT28, also known as Sofacy Group is an (in)famous threat actor. It is a cyber espionage group believed to have...
Ransomware are today very effective and they cause serious problems in many companies, we hear almost everyday entire businesses under...
I received the “call” at the end of 2020 but my second TEDx was on late August 2021. It was...
I wrote several times about code obfuscation on my personal blog over the past 10 years, but this time I’d...
The ransomware builders remind me old times, where Nukes and Exploiters were freely available on the underground communities, when few...
Scenaro : 1. Victim opens the attacker’s web site. 2. Attacker sets up a web site which contain interesting and...
Sam is working as a system administrator in an organization . He captured the principle characteristics of a vulnerability and...