Larbi OUIYZMEBuilding a drone jammer series : Article 1 - Technical approach and legal aspectsIntroductionNov 3Nov 3
Larbi OUIYZMEEarly Cascade Injection : A New challenge for EDR Solutions or the premature end of EDR ?As cyber threats become increasingly sophisticated, attackers are constantly innovating new techniques to evade security measures. One of…Oct 23Oct 23
Larbi OUIYZMEindows forensics Part 2 of 2 : Leveraging PsTools Suite — Essential Sysinternals utilities for…In my previous article, Windows Forensics Part 1 of 2: A Comprehensive Guide to Evidence Collection and Analysis, I explored the…Oct 20Oct 20
Larbi OUIYZMEWindows forensics Part 1 of 2 : A comprehensive guide to evidence collection and analysisWindows forensic investigation is a critical process for uncovering evidence and analyzing post-exploit activity on a system. This guide…Oct 20Oct 20
Larbi OUIYZMEHow to build a successful career in cybersecurity by specializing in one of the 40 key…IntroductionOct 16Oct 16
Larbi OUIYZMEWindows 11 update KB5043145 : Issues and known problemsOn September 26, 2024, Microsoft released the optional KB5043145 update for Windows 11. While it introduced some new features and fixed…Oct 1Oct 1
Larbi OUIYZMEProtect your information assets : Verifying the exposure of private code repositoriesWith the rise of cyberattacks, protecting information assets especially private code repositories, has become a strategic priority for…Sep 24Sep 24
Larbi OUIYZMEComprehensive PHP application security audit : Leveraging PHP.iniSecuring PHP applications is a critical task in web application security, depending on the size of the project and the large number of…Jul 21Jul 21
Larbi OUIYZMEThe use of antivirus, EDR, and XDR technologies in small and medium-sized businesses (SMB)The proliferation of malware, ransomware, Advanced Persistent Threats (APTs), zero-day vulnerabilities, and spear phishing attacks, small…Jul 10Jul 10