Syed Suleman QutbCYBINT collection similarities between Iran and North KoreaSimilarities and behaviors that exist in cyberspace for CYBINT collection between rogue totalitarian states, Iran and North Korea are…4 min read·Jul 30, 2021----
Syed Suleman QutbAdvanced Persistent Threats (APTs)The term APT was first instituted in 2006 by United States Air Forces (USAF) to describe a network based attack technique and its intrusion…14 min read·Jul 29, 2021----
Syed Suleman QutbE-mail Sentiment Analysis using VADERSince mid-90’s, modes of correspondence and communication have tremendously evolved to services like real-time chat rooms, blogs…2 min read·Nov 30, 2020----
Syed Suleman QutbUse of Shannon Entropy Estimation for DGA DetectionFor threat hunters and security researchers, Advanced Persistent Threats (APTs) are always one step ahead especially in case of…2 min read·Nov 23, 2020----
Syed Suleman QutbUsing Machine Learning for DNS Exfiltration / Tunnel DetectionCyber Security Defensive Mechanisms built on Supervised Machine Learning Algorithms heavily rely on old historical logs of recent Cyber…3 min read·Nov 21, 2020--1--1