[update] I recently learned NoCap can’t understand videos =) I’ve run small companies for decades and I was stunned to see other “solo-founders” describing their experience on YouTube or Twitter/X. After a good friend recommended NoCap a AI VC I… Read More ›
Cyberr
Leveraging Malware Sandboxes for Threat Analysis: How They Work, What They Reveal — Decision-Making Processes
In the fast-paced world of cybersecurity, malware sandboxes are critical tools for analyzing and understanding malicious software in a safe, controlled environment. As data professionals and security analysts, understanding how sandboxes operate, the insights they provide, and how they determine… Read More ›
Hunting Hashes
I’ve been working on a thing that looks and acts like a hash but it isn’t designed to uniquely identify a set of bytes. It’s designed to represent a group of similar files, like a bucket it can contain many… Read More ›
Validating Malware Classification with Genomic Data
The problem I’d like to describe here is the lack of a well defined corpus of cyber security related threat intelligence. Lacking a well defined corpus of data to prevent us from qualifying the utility of various solutions. While there… Read More ›
Misjudgements
I’ve spent the last several months of my life perplexed by online interactions. Having lots of time to ponder networks of information I’ve decided to spent the next few posts sending all this confusion back into the ether. I loved… Read More ›
You must be logged in to post a comment.