Warning: Undefined variable $is_post in /home/u378465117/domains/basimibrahim.com/public_html/includes/header.php on line 34
Search: "threat actors" | Basim Ibrahim Blog

Results for "threat actors"

Clear Filter
5h ago 3 min read 2

Bypassing EDR

Bypassing EDR with GenAI is a growing concern, as threat actors leverage AI to evade detection, compromising enterprise security, and emphasizing the need for r...

Read Article
5h ago 4 min read 1

Red Teaming

Red teaming is a crucial cybersecurity strategy, leveraging ethical hacking to test defenses, and it requires careful planning and execution to be effective....

Read Article
AI Threat Intel
2h ago 4 min read 5

AI Threat Intel

AI-powered threat intelligence enhances cybersecurity posture by leveraging machine learning and natural language processing to analyze vast amounts of threat d...

Read Article
16h ago 4 min read

Automating SOC

Automating SOC workflows with Python enhances security operations, reducing response times and improving threat detection, leveraging Python's versatility and e...

Read Article
EDR Bypass
1h ago 3 min read 6

EDR Bypass

EDR bypass techniques using GenAI tactics pose significant threats to enterprise security, enabling attackers to evade detection and execute malicious code, EDR...

Read Article
Cloud VAPT
56 min ago 4 min read 2

Cloud VAPT

Cloud Vulnerability Assessment and Penetration Testing strengthens cloud security posture by identifying vulnerabilities, misconfigurations, and compliance risk...

Read Article
AI Email Security
2h ago 4 min read 3

AI Email Security

AI-driven email security solutions detect phishing, spear phishing, and business email compromise attacks, preventing data breaches and financial losses with ad...

Read Article