Welcome to my blog, where I focus on Threat Hunting, Threat Intelligence, Malware Analysis, and IT Security. From analyzing TTPs and IOCs to reverse engineering samples and building YARA rules, I share hands-on insights into adversary behavior and defensive strategies. Whether it’s detecting stealthy persistence or correlating data in MISP, this space is all about turning raw data into actionable intelligence.
news
| Oct 30, 2025 | Ping Me Maybe - When SubCrawl Started Talking to Teams |
|---|---|
| Sep 01, 2025 | One IP, 500 Suspects |
| Aug 30, 2025 | Volt Typhoon – Constructed Intelligence or Defeated Adversary? |
| Aug 05, 2025 | Plague in Your PAM – Silent, Stealthy, Persistent |
| Aug 03, 2025 | LameHug - Russians Let GPT Do the Dirty Work |
| Jul 15, 2025 | A Promptly Bad Idea - Malware Meets AI |
| Jun 15, 2025 | Brilliant and Simple - Filename-Based Sandbox Evasion |
| Jun 02, 2025 | Slices of Suspicion – The Pentagon Pizza Theory |
| May 15, 2025 | From Obfuscated Garbage to Clarity |