Amir Khashayar Mohammadi

Latest blogs

Topic : Amir Khashayar Mohammadi
  • --Any--
  • A8 Team
  • Aubrey Byron
  • Adam Huenke
  • Jared Campbell
  • Shannon Ragan
  • Abel Vandegrift
  • Amir Khashayar Mohammadi
  • Daniel Ben-Chitrit
  • Jeff Phillips
  • John K. Klassen
  • Justin Cleveland
  • Kurt Cunningham
  • Les Dunston
  • Matt Ashburn
  • Miguel Ramos
  • Ramesh Rajagopal
  • Scott Petry
  • Sean Heritage
  • Thom Kaye

How adversaries use researcher’s digital fingerprint against them

Hidden dangers are lurking in your digital fingerprint. Here's how to manage it.

5 Steps for secure malware analysis

Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the…

generia blog

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch…

generia blog

Guide: 21 OSINT tools for threat intelligence

Are we surprised that the bad guys are taking advantage of the COVID-19 pandemic and the rush into remote work at many companies that it…

generia blog

Hollywood hacks and hackers

Hollywood’s depiction of hacking, on the big screen and in TV dramas or on Netflix, isn’t always accurate, to put it mildly. A closer look…

generia blog

How to detect browser extensions

Working on new methods and tools to identify browser exploits, I recently came across a common question again in a forum: "Is it possible…

generia blog

ActiveX Data Leaks: Making Bad (Non-)Browsers Worse

Outdated browser plugins like ActiveX are a perfect target for compromise, yet they still lack regular updates Outdated browsers and…

generia blog

How Watering Hole Attacks Target the Financial Sector and Governments

Websites of governments, regulatory bodies and financial authorities are preferred targets for "watering hole" attacks on finance,…

generia blog

VPN and privacy: what nobody told you

Did you know that ISPs can use VPN to spy on you? Third parties taking advantage of your VPN’s many flaws for nefarious purposes. We…

Blog updates

Stay updated with the latest posts from the blog
Close
Close