Simulating Ransomware with AWS KMS September 02, 2025 From encryption to extortion: abusing KMS EXTERNAL keys in AWS
Weaponizing Reality: The Evolution of Deepfakes July 30, 2025 Analysis of the evolution of deepfake-based attacks, analyzing various real cases.