In-depth analyses, case studies, and strategic articles on cyber threat intelligence and open source exploitation
You’ll find here a curated selection of analyses, case studies, and strategic articles I’ve written on cyber threat intelligence and the use of open source information.
🔍 Objective: Provide CERT teams, CTI analysts, CISOs, and cybersecurity professionals with a solid, technical, and actionable knowledge base to anticipate, detect, understand, and counter sophisticated threats.
🧠 Topics covered:
- Threat modeling methodologies
- Detection and creation of indicators of compromise (IOCs)
- Adversary analysis and reverse CTI techniques
- Exploiting intelligence from open source data (OSINT)
- Case studies on APTs, ransomware, cyber espionage
- Risk visualization and defense strategies
📚 Available articles:
2025
- F5 Breach: BIG-IP Source Code and Vulnerabilities Stolen by Sophisticated Nation-State Actor
- U.S. Secret Service Dismantles an Imminent Telecommunications Threat in the New York Tristate Area
- Threat Report on Node Package Manager (NPM) Repository Attacks
- Analysis of the Compromise of Ivanti Endpoint Manager Mobile Systems (EPMM) – CISA MAR AR25-261A
- APT-C-53 (Gamaredon): Attack Campaign Targeting Ukrainian Government Entities
- Scattered Spider: Profile, Techniques, and Impact of a Cybercriminal Group
- APT29 — Factual Brief
- Secret Messengers (NSA/GCHQ, 2025)
- ShinyHunters, Scattered Spider and sp1d3rhunters Malware
- The XSS Cybercrime Forum and the Arrest of Its Administrator
- How the MIKRONET Toolkit Compromises MikroTik Routers
- The Interlock Ransomware and the Joint Cybersecurity Advisory of July 22, 2025