M. Ahmad

M. Ahmad is a cybersecurity expert with over four years of experience in threat research and intelligence. He has done master’s from Staffordshire University London in Cyber Security and Forensics. He specializes in cloud security, threat hunting and incident response having worked at FireEye, Blue Hexagon, and Trustwave. He has certifications in Azure Security, Microsoft Defender, and MITRE ATT and CK Defender. Ahmad is a proficient writer and a speaker with his research focusing on vulnerability management, threat detection and malware analysis. He has a passion for sharing his experience and knowledge to keep everyone aware of emerging cybersecurity threats. He has received various awards and certifications.
From Instinct to Intelligence: Threat Hunting at AI Speed

From Instinct to Intelligence: Threat Hunting at AI Speed

Cyber criminals are moving faster at a pace never witnessed before, with many of them using artificial intelligence to conduct…

Multi-Agent Workflows and the Rise of Agentic AI in SOC

Multi-Agent Workflows and the Rise of Agentic AI in SOC

Why Multi-Agent Workflows Matter When building AI, relying on one general-purpose agent is like asking one person to run an…

RedTeamLLM & DeepTeam: The Cutting Edge of AI Red Teaming Innovation

RedTeamLLM & DeepTeam: The Cutting Edge of AI Red Teaming Innovation

Table of Contents 1. Introduction2. RedTeamLLM Agent Architecture:3. Strategic Memory: How RedTeamLLM Learns and Improves Over Time4. Case Study: Roleplay-Based…

Scan, Secure, Ship: Mastering Container Image Security

Scan, Secure, Ship: Mastering Container Image Security

Containers have made the development of applications fast, highly and easily scalable while providing consistency across multiple environments. They are…

No Ports, No Problem: How ZeroTrust Reinvents RDP Security

No Ports, No Problem: How ZeroTrust Reinvents RDP Security

Table of Contents 1. How Traditional RDP is Hacked, Leading To Its Failure?Example of RDP Attack Patterns 2. Zero Trust…

AI in the Crosshairs: Safeguarding Agents from the Threats of Jailbreak and Prompt Injection

AI in the Crosshairs: Safeguarding Agents from the Threats of Jailbreak and Prompt Injection

Table of Contents 1. Security Gaps in AI Agents2. Jailbreak Attacks 2.1 Cracking the Code: Techniques of Jailbreak Attacks 2.2 …

Worms in the Machine: The Hidden Perils of Memory, Prompts, and AI Collaboration

Worms in the Machine: The Hidden Perils of Memory, Prompts, and AI Collaboration

Table of Contents 1. What is a Multi-Agent System?Components of Multi-Agent System (MAS)2. Security Challenges Associated with Multi-Agent Systems3. Securing Interactions...

How Hackers Escape Containers  Using Procfs: A Guide to Security Measures

How Hackers Escape Containers  Using Procfs: A Guide to Security Measures

Many organizations worldwide are using containers for modern application deployment. But are these containers safe from cyberattacks? Let’s investigate. In…

APC INJECTION

APC INJECTION

Asynchronous Procedure Call (APC)process injection is a technique attackers use to execute malicious code within a legitimate process. This technique…

No Featured Image

Guardians Turned Villains: How Cryptography Powers Cybercrime

1. Cryptography’s Dark Side: How Hackers Weaponize RC4, AES and Blowfish 1.1 RC4: The Hacker’s Favorite Cipher – From KSA…