mboll IT-Security ā–®


Hi there! šŸ‘‹

Welcome to my blog — a place for IT-Security that prefers context over headlines.

This space is dedicated to the careful analysis of adversary behavior, malicious infrastructure, and the often inconvenient details that turn raw observations into usable intelligence.


Latest Post

  Your Malware Is Talking. I’m Listening

  Ping Me Maybe - When SubCrawl Started Talking to Teams

  One IP, 500 Suspects

  Volt Typhoon – Constructed Intelligence or Defeated Adversary?

  Volt Typhoon – Constructed Intelligence or Defeated Adversary?

  Brilliant and Simple - Filename-Based Sandbox Evasion

  A Promptly Bad Idea - Malware Meets AI

  Slices of Suspicion – The Pentagon Pizza Theory

  From Obfuscated Garbage to Clarity