Quantcast
Channel: research
Browsing latest articles
Browse All 9 View Live

Image may be NSFW.
Clik here to view.

Building your Kubernets Cluster For Cybersecurity Prototyping

Kubernets and server-less applications would be the biggest next things to protect. So it would be a great idea to start to get practice on such environment, especially if you had no previous...

View Article



Image may be NSFW.
Clik here to view.

From a Phishing Page to a Possible Threat Actor

Disclaimer This blog post, as all the blog posts in my web-corner, want to share cybersecurity related researches and personal experiences in order to improve threats analysis, risks and cybersecurity...

View Article

Image may be NSFW.
Clik here to view.

Running Shellcode Through Windows Callbacks

Introduction When I’ve firstly seen the technique behind the Shellcode execution through Microsoft Windows Callbacks, I thought it was pure magic. But then, digging a little bit on it, I figured out...

View Article

Image may be NSFW.
Clik here to view.

Windows System Calls For Hunters

Introduction System calls are the ultimate high-level atomic actions that Malware writers might control. System calls sequences are the defacto ultimate way to divide behaviors between good and bad....

View Article

Image may be NSFW.
Clik here to view.

Phishing Kits: Threat Actors Analysis Research

Introduction Phishing kits are tools that dark side experts provide to the community of criminal phishers to facilitate the construction of malicious Web sites. As these kitsevolve in sophistication,...

View Article


Image may be NSFW.
Clik here to view.

Amazing Books: The Podcast

I believe books can change a live. I do also believe that Artificial Intelligence might change the way we are working, improving, studying and interacting with each other. So why do not fit them...

View Article

Image may be NSFW.
Clik here to view.

Many Generative Pre-Trained Transformer (GPT): a pragmatic evaluation.

Artificial intelligence (AI) is a rapidly evolving field that involves the development of intelligent machines that can perform tasks that typically require human intelligence, such as visual...

View Article

Image may be NSFW.
Clik here to view.

Polymorphic Malware Using #AI

In the ever-evolving landscape of cybersecurity, malicious actors constantly seek new ways to infiltrate computer systems, wreak havoc, and exploit vulnerabilities. One of their most insidious tools...

View Article


Image may be NSFW.
Clik here to view.

Leading the uncertainty: the decision-driven approach

Many of my readers know me as a cybersecurity expert. More than 12 years of blogging on “security stuff”, malware analyses, cyber attack attributions, new tools and a personal (public here)...

View Article

Browsing latest articles
Browse All 9 View Live




Latest Images