Page 324 - Cyber Defense eMagazine September 2025
P. 324

- What: Pinpoints the systems and data targeted by the threat actors.

            - How: Analyzes the techniques, tools, and methods used in the attack.

            - When: Examines the timing, patterns, and cycles of attacks to predict future threats.



            About the Author

            Diyar  Saadi  is  a  Computer  Security  Researcher  and  an  independent
            consultant examining cyber threats. He campaigns against malware while
            also  offering  classes  on  how  to  reverse  engineer  it.  Diyar  has  been
            involved  in  projects  like  MITRE  ATT&CK  Framework  and  Unprotect.it,
            concentrating  on  adversary-focused  techniques  and  tactics,  including
            counter techniques and defense planning. He is also a speaker in many
            forums around the world, making his contributions to the cybersecurity
            community.  In  addition,  he  has  a  blog  where  he  discusses  reverse
            engineering and cyber threat intelligence.

            Diyar Saadi Ali can be reached online at LinkedIn: https://www.linkedin.com/in/diyarsaadi/

















































            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          324
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   319   320   321   322   323   324   325   326   327   328   329