In-depth analyses, case studies, and strategic articles on cyber threat intelligence and open source exploitation
You’ll find here a curated selection of analyses, case studies, and strategic articles I’ve written on cyber threat intelligence and the use of open source information.
🔍 Objective: Provide CERT teams, CTI analysts, CISOs, and cybersecurity professionals with a solid, technical, and actionable knowledge base to anticipate, detect, understand, and counter sophisticated threats.
🧠 Topics covered:
- Threat modeling methodologies
- Detection and creation of indicators of compromise (IOCs)
- Adversary analysis and reverse CTI techniques
- Exploiting intelligence from open source data (OSINT)
- Case studies on APTs, ransomware, cyber espionage
- Risk visualization and defense strategies
📚 Available articles:
2025
- APT29 — Factual Brief
- Secret Messengers (NSA/GCHQ, 2025)
- ShinyHunters, Scattered Spider and sp1d3rhunters Malware
- The XSS Cybercrime Forum and the Arrest of Its Administrator
- How the MIKRONET Toolkit Compromises MikroTik Routers
- The Interlock Ransomware and the Joint Cybersecurity Advisory of July 22, 2025