Bridging the Digital Divide: How Cybersecurity Experts Drive Remediation and Understand Global Attacker BehaviorCyber SecurityBy InayaJune 14, 2021
Cyber Attacks on Activists and Journalists: A Deep Dive into Indonesia’s Digital VulnerabilitiesCase StudyBy FuadMay 28, 2021
Top 20 best decryption tools of all time to recover your files from ransomwareCyber SecurityBy FuadJuly 14, 2020
Arming Against Cyber Threats: Exploring Essential Tools and Techniques for Threat IntelligenceThreat IntelligenceBy InayaFebruary 7, 2020
Guardians of the Virtual Gates: How Threat Intelligence Thwarted a Catastrophic Cyber AssaultThreat IntelligenceBy InayaFebruary 2, 2020
Unveiling the Shield: Navigating the Cyber Threat Intelligence Lifecycle to Defend Against Sophisticated AttacksThreat IntelligenceBy InayaJanuary 28, 2020
Threat Intelligence 101: Setting the Foundation for CybersecurityThreat IntelligenceBy InayaJanuary 1, 2020
Tokopedia’s 2019 Data Breach — A Deep Dive into the Technical LandscapeCase StudyBy FuadDecember 6, 2019
The Facebook Data Breach of 2018: A Study Case from a Cybersecurity PerspectiveCase StudyBy FuadDecember 15, 2018
The Untold Story of NotPetya: The Cyber Attack that Shook the WorldCase StudyBy InayaSeptember 13, 2018
The Marriott Starwood Data Breach of 2018: A Call for Heightened Cybersecurity VigilanceCase StudyBy FuadSeptember 10, 2018
The SingHealth Data Breach of 2018: A Cybersecurity Analysis and Case StudyCase StudyBy FuadAugust 14, 2018
MyFitnessPal Data Breach: What You Need to Know – a case study of 2018 cyber incidentCase StudyBy FuadMarch 31, 2018