Sukant KumarUnveiling the Spectrum of “Living Off Trusted” Techniques: A Deep Dive into Curated Projects.In my previous blog, I discussed the growing threat of “Living Off Trusted Sites” (LOTS), where attackers exploit legitimate websites and…2 min read·Mar 3, 2024----
Sukant KumarCan You Trust What You See? The Deceptive Tactics of “Living Off Trusted Sites”.The cybersecurity landscape is constantly evolving, with adversaries adopting increasingly sophisticated tactics to evade detection. A…6 min read·Feb 28, 2024----
Sukant KumarLevel Up Your CTI Game: Automated Intelligence with Bard and IFTTTIn the ever-evolving landscape of cyber threats, staying one step ahead is not just a strategic advantage — it’s imperative for…9 min read·Jan 22, 2024----
Sukant KumarThe Rust Shift: Adversaries Embrace New Language for Evasion and EfficiencyMalware goes multilingual: Hackers leverage Rust’s speed and stealth for advanced attacks. Discover the challenges and how to defend.5 min read·Jan 14, 2024----
Sukant KumarPyPI Poisoned: Can Open Source Survive Supply Chain Attacks?Imagine this: You picked a trusted tool from your toolbox to improve your code, only to discover it’s a hidden threat. Instead of progress…4 min read·Dec 25, 2023----