A Brief Deep-Dive into Attacking and Defending Kubernetes December 16, 2025 What attackers do in Kubernetes and how to catch them.
Simulating Ransomware with AWS KMS September 02, 2025 From encryption to extortion: abusing KMS EXTERNAL keys in AWS
Weaponizing Reality: The Evolution of Deepfakes July 30, 2025 Analysis of the evolution of deepfake-based attacks, analyzing various real cases.