PinnedHow X (Twitter) Powers Early Cyber Threat DetectionIn the ever-evolving world of cybersecurity, timely identification of vulnerabilities, exploits, and attacks is crucial. While structured…14h ago14h ago
Unveiling the Spectrum of “Living Off Trusted” Techniques: A Deep Dive into Curated Projects.In my previous blog, I discussed the growing threat of “Living Off Trusted Sites” (LOTS), where attackers exploit legitimate websites and…Mar 3Mar 3
Can You Trust What You See? The Deceptive Tactics of “Living Off Trusted Sites”.The cybersecurity landscape is constantly evolving, with adversaries adopting increasingly sophisticated tactics to evade detection. A…Feb 28Feb 28
Level Up Your CTI Game: Automated Intelligence with Bard and IFTTTIn the ever-evolving landscape of cyber threats, staying one step ahead is not just a strategic advantage — it’s imperative for…Jan 22Jan 22
The Rust Shift: Adversaries Embrace New Language for Evasion and EfficiencyMalware goes multilingual: Hackers leverage Rust’s speed and stealth for advanced attacks. Discover the challenges and how to defend.Jan 14Jan 14
PyPI Poisoned: Can Open Source Survive Supply Chain Attacks?Imagine this: You picked a trusted tool from your toolbox to improve your code, only to discover it’s a hidden threat. Instead of progress…Dec 25, 2023Dec 25, 2023