Articles

  • Nov 8, 2024 | securelist.com | Saurabh Sharma |Victor Sergeev |Amged Wageh |Ahmed Khlief

    IntroductionIn 2021, we began to investigate an attack on the telecom industry in South Asia. During the investigation, we discovered QSC: a multi-plugin malware framework that loads and runs plugins (modules) in memory. The framework includes a Loader, a Core module, a Network module, a Command Shell module and a File Manager module. It is dropped either as a standalone executable or as a payload file along with a loader DLL.

  • Oct 29, 2024 | securelist.com | Victor Sergeev |Ahmed Khlief |Igor Kuznetsov |Amged Wageh

    IntroductionOrganizations often rely on a layered defense strategy, yet breaches still occur, slipping past multiple levels of protection unnoticed. This is where compromise assessment enters the game. The primary objective of these services is risk reduction.

  • Oct 6, 2023 | securitymagazine.com | Victor Sergeev

    Artificial intelligence (AI) and machine learning (ML) were integral components to cybersecurity well before the generative AI era. These technologies have optimized tasks like malware detection, phishing prevention and the automation of security operations centers (SOCs). Due to the hype around AI tools and the introduction of enterprise versions, the use of these solutions will likely see a significant increase in the near future.

  • Apr 18, 2023 | habr.com | Victor Sergeev

    Этот проект можно считать частью №2 по цифровизации старых синтезаторов. В первой части я рассказал, как при помощи AK4103A можно добавить цифровой выход в практически любой синтезатор, где схема ЦАП подразумевает стереопоток, комбинированный в одну I2S DATA линию.

  • Feb 15, 2023 | securelist.com | Vladislav Tushkanov |Maher Yamout |Victor Sergeev

    As the world discusses ChatGPT-3 and its impressive capabilities, the business community is concerned about the AI’s potential to change the game for cyber criminals and wreak havoc in the world of defense organizations. Should businesses soon expect a wave of even more advanced cyber-attacks or simply more attacks? Will current cybersecurity solutions be enough? Or will ChatGPT instead provide cybersecurity specialists with more efficient and smarter defensive and threat hunting tools?

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →