Page 324 - Cyber Defense eMagazine September 2025
P. 324
- What: Pinpoints the systems and data targeted by the threat actors.
- How: Analyzes the techniques, tools, and methods used in the attack.
- When: Examines the timing, patterns, and cycles of attacks to predict future threats.
About the Author
Diyar Saadi is a Computer Security Researcher and an independent
consultant examining cyber threats. He campaigns against malware while
also offering classes on how to reverse engineer it. Diyar has been
involved in projects like MITRE ATT&CK Framework and Unprotect.it,
concentrating on adversary-focused techniques and tactics, including
counter techniques and defense planning. He is also a speaker in many
forums around the world, making his contributions to the cybersecurity
community. In addition, he has a blog where he discusses reverse
engineering and cyber threat intelligence.
Diyar Saadi Ali can be reached online at LinkedIn: https://www.linkedin.com/in/diyarsaadi/
Cyber Defense eMagazine – September 2025 Edition 324
Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.