Published inInfoSec Write-upsFrom Conflict to Collaboration: The Evolution of Vulnerability DisclosureOct 5, 2024Oct 5, 2024
CISA KEV — A Balanced PerspectiveThe advantages and limitations of the CISA KEV catalog, and how to effectively integrate it into an holistic, risk-based VM strategy.Jan 18, 20241Jan 18, 20241
Published inInfoSec Write-upsNahamCon CTF 2023 — OSINT Challenges WalkthroughA detailed walkthrough of all four OSINT Challenges from NahamCon CTF 2023 | by Yotam PerkalJun 20, 20231Jun 20, 20231
Published inInfoSec Write-upsApproaching CTF OSINT Challenges — Learn by ExampleNew to OSINT challenges? General recommendations & Tips on solving OSINT Challenges based on examples from the recent 2022 NahamCon CTF.May 25, 2022May 25, 2022
Published inInfoSec Write-upsNahamCon 2022 CTF Write-up: “No Space Between Us” ChallengeMy approach and learnings from solving the NahamCon 2022 CTF ‘No Space Between Us’ challenge (solved by 62 teams out of over 4000).May 4, 2022May 4, 2022
Published inTDS ArchiveHow I went from Automation Engineer to Data ScientistAdvice and lessons learned from my journey into the world of Data Science and Machine Learning (applicable to any career transition).Aug 12, 20191Aug 12, 20191
Published inThe PayPal Technology BlogHow I went from Automation Engineer to Data ScientistAdvice and lessons learned from my journey into the world of Data Science and Machine Learning.Jul 13, 20191Jul 13, 20191