Posts
All the articles I've posted.
-
The Art of Self-Mutating Malware
An in-depth exploration of self-mutating malware techniques, from polymorphic engines to metamorphic code, and how these evolutionary strategies enable malicious payloads to evade signature-based detection and traditional antivirus defenses.
-
Analysis of Russia’s Expulsion of British Diplomats: The Shifting Battlefield of the UK-Russia Intelligence War
In-depth analysis of the recent Russian expulsion of British diplomats Michael Skinner, Tabassum Parveen Rashid, and Albertus van Rensburg, revealing a major shift in the UK-Russia intelligence confrontation toward economic resilience and the systematic dismantling of Britain’s HUMINT network in Moscow.
-
North Korea-Linked Hackers Use GitHub as C2 Infrastructure to Attack South Korea
FortiGuard Labs has uncovered a new campaign by the North Korea-linked Kimsuky group using GitHub as Command-and-Control infrastructure. The multi-stage attack begins with phishing LNK files, employs heavy anti-VM and anti-analysis techniques, establishes persistence via scheduled tasks, and exfiltrates data to attacker-controlled GitHub repositories.
-
[Confidential] U.S. Department of Defense CMMC Cybersecurity Briefing Document Leaked on the Dark Web
A threat actor has claimed to be selling a U.S. Department of Defense (DoD) **CMMC** cybersecurity briefing document. The document focuses on the core elements of the **CMMC 2.0** framework, including its implementation processes, compliance requirements, and supporting systems. It serves as a standardized cybersecurity compliance guidance document targeted at Defense Industrial Base (DIB) contractors.
-
EDR XDR Bypass and Detection Evasion Techniques: An Investigation of Advanced Evasion Strategies from a Red Team Perspective
An in-depth analysis of EDR/XDR evasion techniques from a red team perspective, covering API unhooking, BOF-based in-memory execution, indirect system calls, ETW bypass, kernel callback evasion, and multi-technique coordination strategies.