PinnedFrom X to Action: Discovering IoCs and Hunting Adversary InfrastructureIn my last blog, we discussed the power of X dorks like (“CVE-2024” AND “IOC”) since:2024–11–01 lang:en, which helped uncover Indicators of…Dec 30, 2024Dec 30, 2024
PinnedHow X (Twitter) Powers Early Cyber Threat DetectionIn the ever-evolving world of cybersecurity, timely identification of vulnerabilities, exploits, and attacks is crucial. While structured…Dec 22, 2024Dec 22, 2024
Unveiling the Spectrum of “Living Off Trusted” Techniques: A Deep Dive into Curated Projects.In my previous blog, I discussed the growing threat of “Living Off Trusted Sites” (LOTS), where attackers exploit legitimate websites and…Mar 3, 2024Mar 3, 2024
Can You Trust What You See? The Deceptive Tactics of “Living Off Trusted Sites”.The cybersecurity landscape is constantly evolving, with adversaries adopting increasingly sophisticated tactics to evade detection. A…Feb 28, 2024Feb 28, 2024
Level Up Your CTI Game: Automated Intelligence with Bard and IFTTTIn the ever-evolving landscape of cyber threats, staying one step ahead is not just a strategic advantage — it’s imperative for…Jan 22, 2024Jan 22, 2024
The Rust Shift: Adversaries Embrace New Language for Evasion and EfficiencyMalware goes multilingual: Hackers leverage Rust’s speed and stealth for advanced attacks. Discover the challenges and how to defend.Jan 14, 2024Jan 14, 2024
PyPI Poisoned: Can Open Source Survive Supply Chain Attacks?Imagine this: You picked a trusted tool from your toolbox to improve your code, only to discover it’s a hidden threat. Instead of progress…Dec 25, 2023Dec 25, 2023