He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.
In the ever-evolving landscape of cybersecurity, securing development environments has burgeoned into a topic of paramount concern, particularly given the omnipresence of software in modern societal infrastructures. A recent uptick
Amazon Web Services (AWS) has a novel post-exploitation approach that has been identified by researchers. This technique enables hackers to utilize the platform’s System Manager (SSM) agent as an undetected
Chinese-speaking threat actors have been shown to be using a Microsoft Windows policy vulnerability to spoof signatures on kernel-mode drivers. The Windows operating system (OS) is divided into two levels,
Cisco released several security patches on Wednesday to fix various software vulnerabilities that could be used to leak sensitive information on affected devices/solutions. The vulnerability classified as (CVE-2022-20866) has been
A group of hackers, suspected of belonging to the North Korean group Lazarus, has targeted the crypto platform Bridge Finance, which is a platform that uses an inter-chain to allow