Jok3r
It's just a matter of time when you will be faced with incident
Posts by this author
- Researching CVE-2025-14847 (Mongo memory leak): Defensive Strategies and Detection Techniques - 27 December 2025 - Posted in Threat Analyze
- Agentic AI challenges in IDE: Forensic and extraction of traces PART 3 - 21 December 2025 - Posted in Incident Response
- Agentic AI challenges in IDE: Forensic and extraction of traces PART 2 - 14 December 2025 - Posted in Incident Response
- Agentic AI challenges in IDE: Forensic and extraction of traces PART 1 - 07 December 2025 - Posted in Incident Response
- AI-Powered Polymorphic Phishing Pages: Detection Methods and Defensive Strategies - 29 November 2025 - Posted in Threat Analyze
- Hunting for Threats in the Dark: Leverage AI Technology to Support Your Investigation - 23 November 2025 - Posted in Incident Response
- Crafting and Case Study of Cost-Effective Universal Hardware Toolkits for specific IR cases - 16 November 2025 - Posted in Incident Response
- Defensive Edge: Adapting Red Team Hardware for IR - 08 November 2025 - Posted in Incident Response
- Cross-Linux Distro Forensic Data Collection Techniques for IR - 01 November 2025 - Posted in Incident Response
- Evidence Collection on Linux Without External Toolkits - 29 October 2025 - Posted in Incident Response
Page 1 of 8
Older »