by Tibor Luter | Jan 25, 2023 | blog
ChatGPT for Offensive and Defensive Cyber There has been a lot of talk recently about ChatGPT and its implications for a wide range of industries. Potential applications are vast, including creative design, technical writing, and programming. In this article,...
by Tibor Luter | Dec 30, 2022 | blog
Forensic Pattern Of Life Analysis Pattern of life analysis isn’t a new concept to anyone who’s ever been involved with intelligence, in particular surveillance. It’s all about the habits that people — suspects, persons of interest, crime victims, or those...
by Tibor Luter | Dec 16, 2022 | blog
Cybersquatting encompasses many techniques such as those that can be seen in the table below. Each example shows a cybersquatted version of “google.com”
by Tibor Luter | Dec 12, 2022 | blog
Iranian APT Targets US With Spyware via GitHub The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a “dead-drop resolver” to more easily evade detection. A subgroup of the state-backed...
by Tibor Luter | Nov 28, 2022 | blog
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms Cyber threat intelligence largely involves the tracking and studying of the adversaries outside of your network. Gaining counterintelligence about your adversaries’ capabilities and weaponry...
Recent Comments