Kamran SaifullahRegistry Run Keys / Startup Folder — Malware PersistenceIn the world of today, Cyber Adversaries are on rise. They are targeting every kind of organization to gain access and then hide…Apr 25, 2021
Sylvia LafairTurn Adversaries into Allies: How Your Enemies Can Become Your Greatest TeachersSummary: We often encounter adversaries who challenge us, push our boundaries, and sometimes make our paths seem arduous. However, what if…Nov 28, 2023Nov 28, 2023
Julian CohenAdversary-Based Threat ModelingMost threat models start with attack surface or critical assets. Those threat models are useless and lead to bad decision-making. In this…Dec 24, 20193Dec 24, 20193
Sardor Abdirayimov[My Takeaways from Papers] Fooling DNNsLet’s discover the important points from 2 papers about fooling DNNsAug 9, 2023Aug 9, 2023
Kamran SaifullahRegistry Run Keys / Startup Folder — Malware PersistenceIn the world of today, Cyber Adversaries are on rise. They are targeting every kind of organization to gain access and then hide…Apr 25, 2021
Sylvia LafairTurn Adversaries into Allies: How Your Enemies Can Become Your Greatest TeachersSummary: We often encounter adversaries who challenge us, push our boundaries, and sometimes make our paths seem arduous. However, what if…Nov 28, 2023
Julian CohenAdversary-Based Threat ModelingMost threat models start with attack surface or critical assets. Those threat models are useless and lead to bad decision-making. In this…Dec 24, 20193
Sardor Abdirayimov[My Takeaways from Papers] Fooling DNNsLet’s discover the important points from 2 papers about fooling DNNsAug 9, 2023
Kamran SaifullahWindows Command Shell — Leveraging CMD To Execute Sneaky StuffIn my previous article I have talked about Windows Registry Keys i.e. what are they and how attackers/adversaries can alter their values…Apr 25, 2021
CryptoNotesNavigating the Complex World of Digital Security: Key Takeaways from ‘Secrets and Lies from Bruce…Chapter 4 of “Secrets and Lies” by Bruce Schneier focuses on the adversaries who pose a threat to digital security. Schneier outlines the…Apr 2, 2023
Manubhav SharmaDecoding A Threat ActorIn today’s era of Cyber Security, threat actors basically are the main actors or the malicious actors, whose behaviour is most crucial for…Mar 1, 2023