Cybersecurity Standards: A Quick Overview
Many times you hear about cybersecurity standards and many times you find yourself in a way to evaluate what you...
Many times you hear about cybersecurity standards and many times you find yourself in a way to evaluate what you...
Kubernets and server-less applications would be the biggest next things to protect. So it would be a great idea to...
APT28, also known as Sofacy Group is an (in)famous threat actor. It is a cyber espionage group believed to have...
Ransomware are today very effective and they cause serious problems in many companies, we hear almost everyday entire businesses under...
I wrote several times about code obfuscation on my personal blog over the past 10 years, but this time I’d...
I wrote several times about code obfuscation on my personal blog over the past 10 years, but this time I’d...
I received the “call” at the end of 2020 but my second TEDx was on late August 2021. It was...
Scenaro : 1. Victim opens the attacker’s web site. 2. Attacker sets up a web site which contain interesting and...
I wrote several times about code obfuscation on my personal blog over the past 10 years, but this time I’d...
I wrote several times about code obfuscation on my personal blog over the past 10 years, but this time I’d...