As the cybersecurity landscape evolves, AI-synthesized malware like Predator presents unique challenges that require innovative detection strategies. In this final installment of my series, we'll explore cutting-edge techniques for detecting such threats and leveraging AI-powered solutions to enhance cybersecurity defenses.
Read MoreHaving completed our observation on how the ELK Stack and Wazuh handle the detection of the proof-of-concept AI-synthesized malware, which I have named Predator, let's circle back and create an Elastic rule to detect Predator's Right-To-Left-Override (RTLO) file name…
Read MoreWelcome to Part 2 of the Predator vs SIEM series. This time, we will be looking at Wazuh. This is a different story—Wazuh was able to fire off high-level alerts using only the default rules. But here's why…
Read MoreFollowing my recent LinkedIn post about Predator, an AI-powered proof-of-concept malware I developed, I wanted to share my observations from testing it against two SIEM solutions - the ELK Stack and Wazuh - set up in my cyber range and home SOC lab. This post is part 1 of the series, focusing on Predator vs ELK Stack.
Read MoreIn the dynamic tech sector, recent layoffs underscore the industry's volatility but also highlight the undiminished value of education and skills. Emphasizing adaptability, continuous learning, and networking is crucial in this rapidly changing environment. Despite challenges, the tech industry offers immense opportunities for growth and innovation to those ready to adapt and leverage their skills effectively.
Read MoreA look at my recent trip to the 106th Indy500 at Indianapolis, Indiana and Garage XYZ first real life event with its community holders.
Read MoreOur Halloween weekend trip to Boston where we met up with a good friend as he show us around the city and other interesting places. My first article on travel and hopefully not the last.
Read More