abdelsyfaneJul 10, 20235 min readEDR Telemetry Project: A Comprehensive ComparisonAuthor Kostas Endpoint Detection and Response (EDR) products have become essential to organizations’ cybersecurity strategies. As a...
abdelsyfaneJan 23, 20239 min readHow does ChatGPT work? Tracing the evolution of AIGCOriginally published on December 31, 2022 at DTonomy Key AIGC Technology Author Peter Luo RNN Seq2Seq For a long time, AIGC has been...
abdelsyfaneSep 19, 20228 min readThreat Hunting Series: The Threat Hunting Process Originally posted on July 17, 2022 on Medium.com Author: Kostas In the previous posts of the series, I covered the basics of threat...
abdelsyfaneJul 18, 20224 min readSummiting the Pyramid of PainAuthor Christopher Peacock The TTP Pyramid This blog was originally published on 3/16/22 by Scythe. A Special Thanks The TTP Pyramid...
Emily StammJan 7, 20212 min read“Raccoon Attack” Targets TLS 1.2 and Earlier, but Is Difficult to ExploitThis blog originally appeared on SSL.com with the title "Racoon Attack" Targets TLS 1.2 and Earlier, but is Difficult to Exploit Author:...
Emily StammNov 30, 202012 min readUsing OSINT Sandboxes To Fill The Gaps Authors: Anaïs Sidhu and Samuel Cameron In this article we will discuss what an OSINT Sandbox is, how it is used practically, and how it...
abdelsyfaneAug 24, 20204 min readIncident Detection and Response in Google Cloud Platform (GCP) Incident Detection and Response in Google Cloud Platform (GCP)
abdelsyfaneAug 17, 20209 min readThe Current State Of Post-Quantum CryptographyThe Current State Of Post-Quantum Cryptography
abdelsyfaneJul 27, 20207 min readGame Theory Applications In Cyber SecurityGame Theory Applications In Cyber Security
abdelsyfaneJul 13, 20204 min readIncident Detection and Response in Amazon Web Services (AWS)Detecting Threats In The Cloud
abdelsyfaneJun 8, 20203 min readReducing Sensitive Data Exposure Through Secrets ManagementHow to reduce sensitive data exposure through secrets management