← Back to Media Coverage

Articles

Exploitable hosts used in cloud native cyber attacks

Exploitable hosts used in cloud native cyber attacks

ScienceDirect
October 2020Article

This is an article I posted in ScienceDirect about theexplotability of hosts in cloud native cyber attacks, specifically talking about how atteckers are using the network to infiltrate cloud native systems, and transfer packets to build container directly on hosts.

Read More β†’
Understanding the evolving threat landscape: APT techniques in a container environment

Understanding the evolving threat landscape: APT techniques in a container environment

ScienceDirect
December 2021Article

This is an article that was posted in ScienceDirect about the evolving threat landscape in cloud native environments, specifically talking about how attackers are using APT techniques to target cloud native systems.

Read More β†’
Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System

Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System

arXiv
June 2024Article

This is part of my thesis work and research towards a data-driven password recommendation system that improves users' passwords based on their usage patterns and preferences.

Read More β†’
Enhancing Passwords with Dpar: A Data-Driven Password Recommendation System

Enhancing Passwords with Dpar: A Data-Driven Password Recommendation System

SSRN
June 2025Article

This is part of my thesis work and research towards a data-driven password recommendation system that improves users' passwords based on their usage patterns and preferences.

Read More β†’
The threats to Jupyter Notebook

The threats to Jupyter Notebook

Computer and fraud security
December 2022Article

This is an article that was posted in Computer and fraud security about the threats to Data Science practitioners and specifically about Jupyter Notebook instances exposed to the internet.

Read More β†’
Container attacks: a blast radius analysis

Container attacks: a blast radius analysis

Network Security
August 2022Article

This is an article that was posted in Network Security about the blast radius of container attacks, specifically talking about how attackers are using the network to infiltrate cloud native systems, and transfer packets to build container directly on hosts.

Read More β†’
RATs in the cloud: gaining access to container environments

RATs in the cloud: gaining access to container environments

Computer and fraud security
April 2022Article

This is an article that was posted in Computer and fraud security about Remote Access Trojans (RATs) and how they are used to gain access to container environments.

Read More β†’