Taha K.

Taha K. Email and Phone Number

Author and Writer - AI and Cyber Security @ Adverserial
New York, NY, US
Taha K.'s Location
United States, United States
Taha K.'s Contact Details

Taha K. personal email

About Taha K.

Taha initially delved into the realm of C++, crafting a micro-kernel and compiler. Eventually, he shifted his focus toward reverse engineering and exploit development. With a well-established history of dissecting intricate cyber intrusions, Taha demonstrates exceptional proficiency in unraveling sophisticated malware and uncovering real-world zero-day exploits.Most Taha's recent publications can be found at: https://lordx64.medium.com/Taha's work is referenced by P0 (Google Project Zero):https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2020/CVE-2020-0674.htmlMedia:https://www.zdnet.com/article/macos-users-targeted-with-new-tarmac-malware/https://www.forbes.com/sites/thomasbrewster/2018/08/30/apple-mac-loophole-breached-in-middle-east-hacks/#66b0d3236fd6https://arstechnica.com/information-technology/2018/12/4-months-after-its-debut-sneaky-mac-malware-went-undetected-by-av-providers/https://www.itwire.com/security/attackers-target-macs-in-campaign-focused-on-gulf-region.htmlhttps://www.bleepingcomputer.com/news/security/hackers-clone-coinbase-metamask-mobile-wallets-to-steal-your-crypto/http://www.securityweek.com/stealthy-backdoor-compromised-global-organizations-2013-fireeyehttps://news.bitcoin.com/hackers-are-cloning-web3-wallets-like-metamask-and-coinbase-wallet-to-steal-crypto/publications: https://www.fireeye.com/blog/threat-research/2015/12/latentbot_trace_me.htmlhttps://www.fireeye.com/blog/threat-research/2016/04/ghosts_in_the_endpoi.htmlhttps://www.fireeye.com/blog/threat-research/2016/10/operations_of_a_braz1.htmlhttps://gsec.hitb.org/materials/sg2018/D1%20COMMSEC%20-%20In%20the%20Trails%20of%20WINDSHIFT%20APT%20-%20Taha%20Karim.pdfhttps://blog.confiant.com/osx-shlayer-new-shurprise-unveiling-osx-tarmac-f965a32de887https://blog.confiant.com/new-macos-bundlore-loader-analysis-ca16d19c058c?gi=8c14d6ad20ehttps://blog.confiant.com/internet-explorer-cve-2019-1367-in-the-wild-exploitation-prelude-ef546f19cd30Conference speaking: BlackHat USA 2017 - Malware Hunting Workshophttps://www.blackhat.com/us-17/business-hall/schedule/#malware-hunting-workshop-8193BH Webcast 2017 - Bankbot Surviveshttps://www.blackhat.com/html/webcast/10052017-scaling-security-operations.htmlBH USA 2018 - Malware Hunting Workshop https://www.blackhat.com/us-18/sponsored-sessions.html#malware-huntingHITB Singapore 2018 - The trails of WINDSHIFT APThttps://gsec.hitb.org/sg2018/sessions/commsec-the-trails-of-windshift-apt/SANS Summit Abu Dhabi 2019https://www.sans.org/event/Cyber-Security-Middle-East-Summit-2019/summit-agenda

Taha K.'s Current Company Details
Adverserial

Adverserial

View
Author and Writer - AI and Cyber Security
New York, NY, US
Taha K. Work Experience Details
  • Adverserial
    Author And Writer - Ai And Cyber Security
    Adverserial
    New York, Ny, Us
  • Cube3 Ai
    Advisory Board Member
    Cube3 Ai Jun 2022 - Present
    Palo Alto, Ca, Us
    Cube3.ai, a cryptocurrency-focused security startup that protects smart contracts by blocking malicious transactions.
  • Confiant Inc
    Director Of Threat Intelligence
    Confiant Inc Apr 2019 - Present
    New York, Us
    At Confiant, I have been at the forefront of establishing and advancing our Cyber Threat Intelligence Program, a cornerstone in our efforts to combat cyber threats and enhance digital security. My key contributions and achievements in this role include:Development of an On-demand Threat Intelligence Platform: I led the design and implementation of a cutting-edge platform providing real-time threat data to our customers. This initiative has been instrumental in enabling rapid response and proactive measures against emerging cyber threats.Creation of the Malvertising Attack Matrix: I conceptualized and developed a comprehensive matrix to categorize and elucidate the complexities of malvertising threats. This matrix, accessible at https://matrix.confiant.com, serves as a vital resource for understanding and combating malvertising.Launch of STIX v2.1-Compliant Threat Intelligence Feeds: Under my leadership, we introduced advanced threat intelligence feeds, available at https://taxii.confiant.com. These feeds adhere to the STIX v2.1 standard, ensuring structured and standardized dissemination of threat information.Establishment of a Malware Intelligence Platform: I spearheaded the creation of a platform focused on the analysis and understanding of macOS and Windows malware, enhancing our capabilities in malware intelligence and response.Publication and Thought Leadership: I have authored and contributed to numerous insightful blog posts on threat intelligence and cybersecurity research, featured at https://blog.confiant.com. My writings reflect a deep understanding of the cyber threat landscape and contribute significantly to the broader cybersecurity discourse.Community Engagement and Education: I actively engage in disseminating threat intelligence and educating the community through our dedicated Twitter handle @ConfiantIntel. This outreach has been pivotal in raising awareness and fostering a more informed and prepared online community.
  • Confiant Inc
    Lead Security Researcher
    Confiant Inc Apr 2019 - Present
    New York, Us
    In addition to my responsibilities in Cyber Threat Intelligence (CTI), I engage in comprehensive analysis of browser exploits and malware, and construct automated analysis environments. My expertise is particularly concentrated on macOS malware, utilizing tools such as Radare2, IDA Pro, and various emulation engines. My efforts have been instrumental in the discovery of several macOS malware instances, including those that are signed and notarized, as well as identifying emerging malware families targeting Apple's M1 platform.
  • Tephracore
    Founder
    Tephracore Apr 2019 - Present
    Services Delivered: - Training: "Tactical Malware Analysis" a 3 day technical malware analysis course- Consulting: CTI, malware analysis, web3 security.
  • Exodus Intelligence
    Vulnerability Researcher - Mobile 0-Day Team
    Exodus Intelligence May 2021 - Sep 2021
    Austin, Texas, Us
    vulnerability research focus on mobile 0day research
  • Darkmatter Llc
    Head Of Malware Research Lab
    Darkmatter Llc Nov 2017 - Apr 2019
    Dubai, Ae
    In my role as the Director of Cyber Threat Intelligence and Malware Research, I was entrusted with the critical responsibility of establishing and leading a targeted tactical cyber threat intelligence program. Reporting directly to the Executive Senior Vice President, my key initiatives and accomplishments included:Establishment of a Malware Research Laboratory: I spearheaded the construction of a state-of-the-art malware research lab. This facility was dedicated to delivering specialized malware intelligence and analysis services to a diverse range of clients, significantly enhancing our capabilities in identifying and mitigating advanced malware threats.Development of a Mobile Cyber Threat Intelligence Platform: I led the development of the region's first comprehensive mobile cyber threat intelligence platform. This platform specialized in the in-depth analysis of Android and iOS applications, marking a significant advancement in mobile security. Key achievements of this platform included:- Successful detection of numerous malicious applications within the official Google Play Store.- Provision of detailed intelligence and reports on security and privacy issues prevalent in widely used app categories in the region.Discovery and Analysis of Advanced Persistent Threats (APTs): My strategic direction was instrumental in uncovering the WINDSHIFT APT, a surveillance-focused threat, along with several other APTs targeting the region. This work not only bolstered regional cybersecurity but also contributed significantly to the global understanding of APT tactics and techniques.Thought Leadership and Industry Contribution: A portion of my research, particularly on the WINDSHIFT APT, was presented and published at the prestigious Hack In The Box (HITB) security conference in Singapore in 2018. This presentation, titled "In the Trails of WINDSHIFT APT," was well-received and underscored our lab's expertise in cutting-edge cyber threat intelligence.
  • Darkmatter Llc
    Lead Security Researcher - Special Projects
    Darkmatter Llc Nov 2016 - Nov 2017
    Dubai, Ae
    - Software and Hardware security assessments + Vulnerability research in internal built solutions and 3rd party vendors platforms.
  • Fireeye, Inc.
    Senior Malware Researcher / Reverse Engineer
    Fireeye, Inc. Jun 2015 - Nov 2016
    Milpitas, California, Us
    During my tenure at FireEye, Inc., a leader in advanced cybersecurity solutions, I played a pivotal role in the elite FireEye Labs team, known internally as the "ninja team." My responsibilities and achievements in this high-impact role included:Advanced Persistent Threat (APT) Analysis and Tracking: I spearheaded efforts in dissecting and reverse-engineering complex malware used by various nation-state actors. This involved unraveling the intricacies of their payloads, which was crucial in providing actionable intelligence. My work directly contributed to the identification and tracking of multiple APTs, enhancing our understanding of their tactics, techniques, and procedures (TTPs).Development of Detection Mechanisms: I was instrumental in authoring and refining detection signatures and rules in FireEye's NX, AX, EX, MVX, proprietary analysis engines. This work was critical in enhancing our defensive capabilities against sophisticated cyber threats and played a key role in the early detection of malicious activities.Focus on Cyber Espionage: A significant portion of my role was dedicated to investigating and understanding the landscape of cyber espionage. This involved not only technical analysis but also contextualizing the cyber threats within the broader geopolitical landscape. My insights and findings were vital in informing both our internal strategy and the cybersecurity posture of our clients.Collaboration and Knowledge Sharing: I actively collaborated with cross-functional teams, sharing my expertise and insights. This collaboration was essential in driving forward our collective understanding of emerging threats and refining our overall cybersecurity strategy.In this role, I not only honed my technical skills in malware analysis and reverse engineering but also developed a keen understanding of the strategic aspects of cyber intelligence, making significant contributions to the field of cybersecurity and national security.
  • Symantec
    Security Engineer / Malware Researcher
    Symantec Jul 2011 - Jun 2015
    San Jose, California, Us
  • Probance
    Senior Software Engineer
    Probance Jun 2010 - Jun 2011
    Saint Cloud, Île-De-France, Fr
    In my role as a Senior Software Engineer at Probance, a company at the forefront of AI-driven marketing solutions, I was deeply involved in several key aspects of software development and machine learning. My primary responsibilities and achievements included:Java Development: Leveraged my expertise in Java to develop robust, scalable software solutions. This involved working through the entire software development lifecycle, from concept to deployment, ensuring high-quality code and adherence to best practices in software engineering.Predictive Analysis and Machine Learning: Played a pivotal role in integrating predictive analysis models and machine learning algorithms into our software solutions. This included working with KXEN, a leading machine learning platform, to enhance the predictive capabilities of our products.Database Management: Was responsible for the design, implementation, and maintenance of complex database systems. This involved ensuring data integrity, performance optimization, and scalability to support our advanced analytics capabilities.Algorithm Implementation: Took the lead in implementing various algorithms, including the Apriori algorithm, among others. My work focused on enhancing data analysis capabilities and providing deeper insights into large datasets. This was crucial in driving data-driven decision-making processes for our clients.
  • General Electric
    Software Engineer
    General Electric Mar 2010 - Jun 2010
    Boston, Ma, Us
    Contributed to the development of GE CT scanner software, widely used in hospitals, by implementing specialized iodine filters for enhanced arterial imaging. This work involved complex mathematical calculations on matrices, extensive use of C++ template programming, and advanced image processing techniques. This significant enhancement is expected to improve patient outcomes and potentially save lives.
  • Groupe Tf1
    Red Team
    Groupe Tf1 Feb 2009 - Jul 2009
    Boulogne Billancourt, Cedex, Fr
  • Epita
    Root (Yaka/Acu)
    Epita Aug 2007 - Jan 2009
    Kremlin Bicêtre, Fr
  • Epita
    C/C++ Teacher (Yaka/Acu)
    Epita Aug 2007 - Jan 2009
    Kremlin Bicêtre, Fr
  • Bnp Paribas
    Software Engineer
    Bnp Paribas Aug 2007 - Feb 2008
    Paris, Fr
    C++, quantitative analysis

Taha K. Skills

Python Networking Java Vulnerability Assessment Network Security Reverse Enginer Security Unix Script Shell Cloud Computing Test D'intrusion Perl

Taha K. Education Details

  • Epita: Ecole D'Ingénieurs En Informatique
    Epita: Ecole D'Ingénieurs En Informatique
    Computer And Information Systems Security/Information Assurance
  • Ionis-Stm, École De Double Compétence
    Ionis-Stm, École De Double Compétence
    Information Technology Project Management
  • Epita: Ecole D'Ingénieurs En Informatique
    Epita: Ecole D'Ingénieurs En Informatique
    Computer Science

Frequently Asked Questions about Taha K.

What company does Taha K. work for?

Taha K. works for Adverserial

What is Taha K.'s role at the current company?

Taha K.'s current role is Author and Writer - AI and Cyber Security.

What is Taha K.'s email address?

Taha K.'s email address is ta****@****ail.com

What schools did Taha K. attend?

Taha K. attended Epita: Ecole D'ingénieurs En Informatique, Ionis-Stm, École De Double Compétence, Epita: Ecole D'ingénieurs En Informatique.

What skills is Taha K. known for?

Taha K. has skills like Python, Networking, Java, Vulnerability Assessment, Network Security, Reverse Enginer, Security, Unix, Script Shell, Cloud Computing, Test D'intrusion, Perl.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.