Open in app

Sign in

Write

Sign in

Ionut Vasile
Ionut Vasile

37 Followers

Home

About

Aug 8

Hide and Seek in Binary: How Hackers Leverage Native Tools for Stealthy Attacks

In the shadowy theaters of cyber warfare, attackers and defenders continuously dance in an intricate ballet of evasion and detection. As cyber defense mechanisms grow more advanced, so too do the methods of the attackers. One such method that has increasingly gained traction amongst the hacker elite is the tactic…

Information Security

4 min read

Hide and Seek in Binary: How Hackers Leverage Native Tools for Stealthy Attacks
Hide and Seek in Binary: How Hackers Leverage Native Tools for Stealthy Attacks
Information Security

4 min read


Jul 30

Infrastructure as Code (IaC): Managing the Complexity of Cloud Security

The introduction of Infrastructure as Code (IaC) has radically transformed the modern IT landscape, reinventing traditional system administration and providing a mechanism to manage complex cloud environments efficiently. …

Cybersecurity

4 min read

Infrastructure as Code (IaC): Managing the Complexity of Cloud Security
Infrastructure as Code (IaC): Managing the Complexity of Cloud Security
Cybersecurity

4 min read


Jul 29

A Deep Dive into Advanced Persistent Threats: A Case Study in Detection, Analysis, and Response

In the cybersecurity landscape, few threats are as insidious or as damaging as Advanced Persistent Threats (APTs). APTs are prolonged, targeted attacks on networks where intruders establish a foothold and remain undetected for extended periods. This allows them to steal, manipulate, or delete data, disrupt operations, or prepare for further…

Information Security

4 min read

A Deep Dive into Advanced Persistent Threats: A Case Study in Detection, Analysis, and Response
A Deep Dive into Advanced Persistent Threats: A Case Study in Detection, Analysis, and Response
Information Security

4 min read


Jul 28

Playing for Keeps: Unmasking Persistence Techniques in Cyber Exploitation

The world of cybersecurity is akin to an intricate game of chess. Cyber attackers and defenders are constantly countering each other’s moves, seeking to out-maneuver the other with brilliant, often bewildering, strategies. One such fascinating yet alarming maneuver in this global contest is the technique of ‘creating persistence during post-exploitation’…

Information Security

5 min read

Playing for Keeps: Unmasking Persistence Techniques in Cyber Exploitation
Playing for Keeps: Unmasking Persistence Techniques in Cyber Exploitation
Information Security

5 min read


Jul 27

Silicon Battlefield: Confronting the Rise of IoT Attacks

The rapid proliferation of Internet of Things (IoT) devices has brought an array of conveniences into our lives, opening up new frontiers for smart homes, businesses, cities, and more. However, this explosion of connectivity has also drawn the attention of cybercriminals, who have found fertile ground in the landscape of…

Information Security

5 min read

Silicon Battlefield: Confronting the Rise of IoT Attacks
Silicon Battlefield: Confronting the Rise of IoT Attacks
Information Security

5 min read


Jul 26

Riding the Storm: An Analysis of Cyber Threats in the Cloud

The digital transformation in today’s enterprises has opened a gateway to tremendous possibilities, but it has also opened a Pandora’s box of cyber threats. Cloud computing, the leading light of the digital revolution, is not immune. In the highly connected landscape of the cloud, a single vulnerability can provide the…

Information Security

5 min read

Riding the Storm: An Analysis of Cyber Threats in the Cloud
Riding the Storm: An Analysis of Cyber Threats in the Cloud
Information Security

5 min read


Jul 25

Beyond Access Control: Confronting Privilege Escalation

In the evolving landscape of cybersecurity, the art of privilege escalation has carved out a niche for itself. It serves as a testament to the relentless pursuit of access and control by cybercriminals and the pivotal role it plays in high-profile breaches. …

Information Security

5 min read

Beyond Access Control: Confronting Privilege Escalation
Beyond Access Control: Confronting Privilege Escalation
Information Security

5 min read


Jul 24

The War Against Cybercrime: The Role of Intrusion Analysis and Incident Handling

In the high-stakes cyber chessboard where threats and vulnerabilities evolve with dizzying speed, no defense is entirely impervious. From small startups to large multinational corporations, a swift, well-coordinated response to cybersecurity incidents is not a luxury, but a necessity. …

Information Security

6 min read

The War Against Cybercrime: The Role of Intrusion Analysis and Incident Handling
The War Against Cybercrime: The Role of Intrusion Analysis and Incident Handling
Information Security

6 min read


Jul 23

Unlocking the Power of BeEF: A Dive into Browser Exploitation

In the dynamic and ever-evolving landscape of cybersecurity, unique and innovative tools are the keys to staying one step ahead of potential threats. Among these instruments, BeEF, or Browser Exploitation Framework, carves out a unique space by targeting the weakest link in the chain — web browsers. …

Information Security

4 min read

Unlocking the Power of BeEF: A Dive into Browser Exploitation
Unlocking the Power of BeEF: A Dive into Browser Exploitation
Information Security

4 min read


Jul 22

Exploring Scapy: An Insight into its Capabilities

In the intricate world of cybersecurity, mastery of the tools and techniques that define the landscape is paramount. One such technique, which has become increasingly popular among both security professionals and malicious actors, is packet crafting. …

Infosec

5 min read

Exploring Scapy: An Insight into its Capabilities
Exploring Scapy: An Insight into its Capabilities
Infosec

5 min read

Ionut Vasile

Ionut Vasile

37 Followers

An eager learner with a wide range area of understanding in different technologies.

Following
  • Alex Mathers

    Alex Mathers

  • Anna Burgess Yang

    Anna Burgess Yang

  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • Jonathan Peykar

    Jonathan Peykar

  • Chris Davidson

    Chris Davidson

See all (43)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams