A collection of research, dispatches, and technical deep-dives.
[ < ROOT ]Diving deep into how zero-day vulnerabilities are discovered, weaponized, and what you can do to mitigate...
Read EntryWhy integrating security into the development pipeline isn't just a good idea—it's an absolute necessity...
Read EntryExploring my current research at NFSU and the challenges in mobile and cloud-based forensic analysis...
Read EntryAttacking the weakest link. A look into modern phishing, vishing, and pretexting campaigns and how to train for them...
Read EntryFrom concept to deployment. The architectural challenges and security considerations behind a multi-tenant SaaS platform...
Read EntryHow machine learning models are being used to automate vulnerability discovery, and where they still fall short...
Read Entry