Welcome to my article repository! This repository contains a collection of articles on spesific topics. Feel free to explore and learn from them.
- Introduction
- Articles
In this repository, you'll find well-researched articles covering cyber security topics. Hope this would be some nice additions to your knowledge.
Browse through the articles in this repository:
- A Tech Analysis Series: Androxgh0st malware botnet steals AWS, Microsoft credentials
- Having recently perused an article detailing the exploits of the 'Androxgh0st' malware botnet, specifically its theft of AWS and Microsoft credentials, I conducted a brief inquiry during my leisure to comprehend the scope and nature of the threat at hand.
- https://www.linkedin.com/pulse/androxgh0st-malware-botnet-steals-aws-microsoft-adhitya-priyanka-10ufc
- A Tech Analysis Series: Analyzing Zero-Click CVE-2023-4863 - A Tale of a CVE with Much Bigger Implications
- Have you ever wondered how WEBP Zero Click attacks occur? This article might quench your curiosity. I invested considerable time in writing it, hoping you find it intriguing.
- https://www.linkedin.com/pulse/analyzing-zero-click-cve-2023-4863-tale-cve-much-bigger-priyanka-9y3cc/
- In the Zero Trust concept, you don't trust anyone. Since many breaches after robust implementation of Zero Trust architecture, should we trust Zero Trust?
- Disecting Lokibot Malware - Mengupas Teknik Canggih Lokibot Malware dan Menguak Hidden-Malware di Baliknya - In Bahasa Indonesia
- Recently, I conducted a malware analysis on Lokibot and discovered it employs sophisticated anti-forensic techniques, significantly challenging researchers attempting reverse engineering. Despite these hurdles, I successfully managed to extract the fileless malware, paving the way for further in-depth analysis. The hash of the concealed malware often evades detection by standard security products, rendering signature-based defenses ineffective. This underscores the necessity of utilizing solutions equipped with sandboxing capabilities or behavioral analysis to combat such threats effectively. You can find my detailed article on Kumparan.com, although it is in Indonesian. May you discover something enriching, for learning is our daily voyage of growth.
- https://kumparan.com/adhitya4work/237Fc7czWaN
- A Tech Story Telling Series: The Espionage Campaign - Kaspersky, iPhones, and U.S. Intelligence
- Russia's Federal Security Service (FSB) accused U.S. intelligence of hacking thousands of iPhones, including diplomats' devices, in an espionage campaign. They claim Apple collaborated with U.S. hackers, which Apple denies. Kaspersky Lab reported iPhones running iOS 15.7 were infected by file-stealing malware through zero-click iMessage attacks, although Kaspersky found no proof of U.S. involvement. The attack involved a remote code execution vulnerability, allowing privileged malware installation, and was dubbed "Operation Triangulation." Apple denied working with any government to insert backdoors into its products. This story draws from past reports in Security Week and The Washington Post, but the intrigue still lingers. I’ve woven a tech-focused narrative around the events, blending facts with deeper analysis, and turned it into a captivating piece of storytelling. You can read the full story in this article. I hope you find the story enjoyable!
- https://www.linkedin.com/pulse/tech-story-telling-series-espionage-campaign-iphones-priyanka-ynkic
- Malware Series: Exploring the Inner Workings of RemcosRAT
- RemcosRAT—a cunning piece of malware I discovered while exploring a malware bazaar database. I'm breaking down this threat for everyone so you can stay ahead in the fight against cyber threats. Some might ask, 'Why not just use AI or comprehensive solutions out there? It would be faster.' And you’re right! But where’s the fun in that? By engaging in this analysis, we gain insight into how hackers evolve. Additionally, since hackers employ anti-forensic techniques, automated analysis solutions might not provide the complete picture.
- https://www.linkedin.com/pulse/malware-series-exploring-inner-workings-remcosrat-adhitya-priyanka-ijkqc
- A Tech Story Telling Series: Unraveling The Enigma of Indonesia’s Online Gambling Surge
- Recently, Universitas Indonesia has been exploited to promote online gambling, raising concerns about the intersection of cybersecurity and digital trust. As search engines can sometimes mislead users into believing they’re encountering trustworthy content, this case underscores the importance of vigilance in our online activities. In my latest article, I explore the implications of SEO manipulation, negative SEO attacks, and the vulnerabilities associated with WordPress sites. If you enjoy storytelling about tech and cybersecurity, you’ll love this exploration of how to better protect ourselves and our digital spaces from emerging threats.
- https://www.linkedin.com/pulse/tech-story-telling-series-unraveling-enigma-online-surge-priyanka-t83ae/
- A Tech Story Telling Series: Trading - Decoding Market Behavior with a Cybersecurity
- Market is bunch a numbers and market reaction. Human reaction is guessable and have psichological pattern. Once we decode it, we can exploit it to gain profit from it. Can you decode the market movement? If you can decode what will happened with the market only just for the next 1 hours, you'll conquer the world. That is the new capture the flag.
- https://github.com/adhitya-cysec/article/blob/main/blog/Decoding-Market-Behavior-with-a-Cybersecurity-Mindset.md
- A Tech Story Telling Series: The Zero Trust Revolution: Secure Everything, Trust Nothing—Not Even Zero Trust
- In a previous post, I introduced Zero Trust and shared a PDF to help you dive into its core principles. But here, we’re going to shake things up and look at Zero Trust from a fresh angle. Implementing Zero Trust often means working with multiple products and vendors—so it’s crucial to understand what that actually entails. Sure, there are powerful benefits—but what are the hidden costs? Can these challenges really be tackled, or are they bigger than we think? Let’s unravel these insights together in my latest short Tech Story Telling series article.
- A much deeper understanding than previous post
- https://www.linkedin.com/pulse/tech-story-telling-series-zero-trust-revolution-secure-priyanka-sc6qc
Happy reading! 📚✍️