logo_cool.png

Welcome to my blog, where I focus on Threat Hunting, Threat Intelligence, Malware Analysis, and IT Security. From analyzing TTPs and IOCs to reverse engineering samples and building YARA rules, I share hands-on insights into adversary behavior and defensive strategies. Whether it’s detecting stealthy persistence or correlating data in MISP, this space is all about turning raw data into actionable intelligence.

news