top asian cyber threats
  • Table of contents

The author

user_image
Adrianne Chester Camat
Share on LinkedIn

Cyber Security threat analyst and researcher with a decade and a half worth of experience in the Cyber Security industry. Currently specializing in Cyber Threat Intelligence. Previously specialized in creating, implementing and extending back-end tools and systems to automate and improve security posture. Knowledgeable in dynamic and static analysis and malware reverse engineering to help support customers by providing detection pattern and solutions. Current roles and past experience in a SOC/CSIRT environment. Roles include threat triage, analysis, security intel research, MSS, WAF, CDN, SIEM, and people management.Cyber Security threat analyst and researcher with a decade and a half worth of experience in the Cyber Security industry. Currently specializing in Cyber Threat Intelligence. Previously specialized in creating, implementing and extending back-end tools and systems to automate and improve security posture. Knowledgeable in dynamic and static analysis and malware reverse engineering to help support customers by providing detection pattern and solutions. Current roles and past experience in a SOC/CSIRT environment. Roles include threat triage, analysis, security intel research, MSS, WAF, CDN, SIEM, and people management.

Table of contents

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start