post 2023 Breaches and Incidents: Personal NotesAttack Cyber Crime cybersecurity data breachJune 22, 2023June 22, 2023
post Many Generative Pre-Trained Transformer (GPT): a pragmatic evaluation.LLM-GPT researchApril 12, 2023April 12, 2023
post Onenote Malware: Classification and Personal NotesCyber Crime cybersecurity malware SecurityFebruary 4, 2023February 4, 2023
post Phishing Kits: Threat Actors Analysis ResearchAttack Cyber Crime cybersecurity researchNovember 9, 2022November 9, 2022
post Running Shellcode Through Windows CallbacksAttack cybersecurity researchJune 15, 2022June 15, 2022