Taha K. Email and Phone Number
Taha K. personal email
- Valid
Taha initially delved into the realm of C++, crafting a micro-kernel and compiler. Eventually, he shifted his focus toward reverse engineering and exploit development. With a well-established history of dissecting intricate cyber intrusions, Taha demonstrates exceptional proficiency in unraveling sophisticated malware and uncovering real-world zero-day exploits.Most Taha's recent publications can be found at: https://lordx64.medium.com/Taha's work is referenced by P0 (Google Project Zero):https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2020/CVE-2020-0674.htmlMedia:https://www.zdnet.com/article/macos-users-targeted-with-new-tarmac-malware/https://www.forbes.com/sites/thomasbrewster/2018/08/30/apple-mac-loophole-breached-in-middle-east-hacks/#66b0d3236fd6https://arstechnica.com/information-technology/2018/12/4-months-after-its-debut-sneaky-mac-malware-went-undetected-by-av-providers/https://www.itwire.com/security/attackers-target-macs-in-campaign-focused-on-gulf-region.htmlhttps://www.bleepingcomputer.com/news/security/hackers-clone-coinbase-metamask-mobile-wallets-to-steal-your-crypto/http://www.securityweek.com/stealthy-backdoor-compromised-global-organizations-2013-fireeyehttps://news.bitcoin.com/hackers-are-cloning-web3-wallets-like-metamask-and-coinbase-wallet-to-steal-crypto/publications: https://www.fireeye.com/blog/threat-research/2015/12/latentbot_trace_me.htmlhttps://www.fireeye.com/blog/threat-research/2016/04/ghosts_in_the_endpoi.htmlhttps://www.fireeye.com/blog/threat-research/2016/10/operations_of_a_braz1.htmlhttps://gsec.hitb.org/materials/sg2018/D1%20COMMSEC%20-%20In%20the%20Trails%20of%20WINDSHIFT%20APT%20-%20Taha%20Karim.pdfhttps://blog.confiant.com/osx-shlayer-new-shurprise-unveiling-osx-tarmac-f965a32de887https://blog.confiant.com/new-macos-bundlore-loader-analysis-ca16d19c058c?gi=8c14d6ad20ehttps://blog.confiant.com/internet-explorer-cve-2019-1367-in-the-wild-exploitation-prelude-ef546f19cd30Conference speaking: BlackHat USA 2017 - Malware Hunting Workshophttps://www.blackhat.com/us-17/business-hall/schedule/#malware-hunting-workshop-8193BH Webcast 2017 - Bankbot Surviveshttps://www.blackhat.com/html/webcast/10052017-scaling-security-operations.htmlBH USA 2018 - Malware Hunting Workshop https://www.blackhat.com/us-18/sponsored-sessions.html#malware-huntingHITB Singapore 2018 - The trails of WINDSHIFT APThttps://gsec.hitb.org/sg2018/sessions/commsec-the-trails-of-windshift-apt/SANS Summit Abu Dhabi 2019https://www.sans.org/event/Cyber-Security-Middle-East-Summit-2019/summit-agenda
-
Author And Writer - Ai And Cyber SecurityAdverserialNew York, Ny, Us
-
Advisory Board MemberCube3 Ai Jun 2022 - PresentPalo Alto, Ca, UsCube3.ai, a cryptocurrency-focused security startup that protects smart contracts by blocking malicious transactions. -
Director Of Threat IntelligenceConfiant Inc Apr 2019 - PresentNew York, UsAt Confiant, I have been at the forefront of establishing and advancing our Cyber Threat Intelligence Program, a cornerstone in our efforts to combat cyber threats and enhance digital security. My key contributions and achievements in this role include:Development of an On-demand Threat Intelligence Platform: I led the design and implementation of a cutting-edge platform providing real-time threat data to our customers. This initiative has been instrumental in enabling rapid response and proactive measures against emerging cyber threats.Creation of the Malvertising Attack Matrix: I conceptualized and developed a comprehensive matrix to categorize and elucidate the complexities of malvertising threats. This matrix, accessible at https://matrix.confiant.com, serves as a vital resource for understanding and combating malvertising.Launch of STIX v2.1-Compliant Threat Intelligence Feeds: Under my leadership, we introduced advanced threat intelligence feeds, available at https://taxii.confiant.com. These feeds adhere to the STIX v2.1 standard, ensuring structured and standardized dissemination of threat information.Establishment of a Malware Intelligence Platform: I spearheaded the creation of a platform focused on the analysis and understanding of macOS and Windows malware, enhancing our capabilities in malware intelligence and response.Publication and Thought Leadership: I have authored and contributed to numerous insightful blog posts on threat intelligence and cybersecurity research, featured at https://blog.confiant.com. My writings reflect a deep understanding of the cyber threat landscape and contribute significantly to the broader cybersecurity discourse.Community Engagement and Education: I actively engage in disseminating threat intelligence and educating the community through our dedicated Twitter handle @ConfiantIntel. This outreach has been pivotal in raising awareness and fostering a more informed and prepared online community. -
Lead Security ResearcherConfiant Inc Apr 2019 - PresentNew York, UsIn addition to my responsibilities in Cyber Threat Intelligence (CTI), I engage in comprehensive analysis of browser exploits and malware, and construct automated analysis environments. My expertise is particularly concentrated on macOS malware, utilizing tools such as Radare2, IDA Pro, and various emulation engines. My efforts have been instrumental in the discovery of several macOS malware instances, including those that are signed and notarized, as well as identifying emerging malware families targeting Apple's M1 platform. -
FounderTephracore Apr 2019 - PresentServices Delivered: - Training: "Tactical Malware Analysis" a 3 day technical malware analysis course- Consulting: CTI, malware analysis, web3 security. -
Vulnerability Researcher - Mobile 0-Day TeamExodus Intelligence May 2021 - Sep 2021Austin, Texas, Usvulnerability research focus on mobile 0day research -
Head Of Malware Research LabDarkmatter Llc Nov 2017 - Apr 2019Dubai, AeIn my role as the Director of Cyber Threat Intelligence and Malware Research, I was entrusted with the critical responsibility of establishing and leading a targeted tactical cyber threat intelligence program. Reporting directly to the Executive Senior Vice President, my key initiatives and accomplishments included:Establishment of a Malware Research Laboratory: I spearheaded the construction of a state-of-the-art malware research lab. This facility was dedicated to delivering specialized malware intelligence and analysis services to a diverse range of clients, significantly enhancing our capabilities in identifying and mitigating advanced malware threats.Development of a Mobile Cyber Threat Intelligence Platform: I led the development of the region's first comprehensive mobile cyber threat intelligence platform. This platform specialized in the in-depth analysis of Android and iOS applications, marking a significant advancement in mobile security. Key achievements of this platform included:- Successful detection of numerous malicious applications within the official Google Play Store.- Provision of detailed intelligence and reports on security and privacy issues prevalent in widely used app categories in the region.Discovery and Analysis of Advanced Persistent Threats (APTs): My strategic direction was instrumental in uncovering the WINDSHIFT APT, a surveillance-focused threat, along with several other APTs targeting the region. This work not only bolstered regional cybersecurity but also contributed significantly to the global understanding of APT tactics and techniques.Thought Leadership and Industry Contribution: A portion of my research, particularly on the WINDSHIFT APT, was presented and published at the prestigious Hack In The Box (HITB) security conference in Singapore in 2018. This presentation, titled "In the Trails of WINDSHIFT APT," was well-received and underscored our lab's expertise in cutting-edge cyber threat intelligence. -
Lead Security Researcher - Special ProjectsDarkmatter Llc Nov 2016 - Nov 2017Dubai, Ae- Software and Hardware security assessments + Vulnerability research in internal built solutions and 3rd party vendors platforms. -
Senior Malware Researcher / Reverse EngineerFireeye, Inc. Jun 2015 - Nov 2016Milpitas, California, UsDuring my tenure at FireEye, Inc., a leader in advanced cybersecurity solutions, I played a pivotal role in the elite FireEye Labs team, known internally as the "ninja team." My responsibilities and achievements in this high-impact role included:Advanced Persistent Threat (APT) Analysis and Tracking: I spearheaded efforts in dissecting and reverse-engineering complex malware used by various nation-state actors. This involved unraveling the intricacies of their payloads, which was crucial in providing actionable intelligence. My work directly contributed to the identification and tracking of multiple APTs, enhancing our understanding of their tactics, techniques, and procedures (TTPs).Development of Detection Mechanisms: I was instrumental in authoring and refining detection signatures and rules in FireEye's NX, AX, EX, MVX, proprietary analysis engines. This work was critical in enhancing our defensive capabilities against sophisticated cyber threats and played a key role in the early detection of malicious activities.Focus on Cyber Espionage: A significant portion of my role was dedicated to investigating and understanding the landscape of cyber espionage. This involved not only technical analysis but also contextualizing the cyber threats within the broader geopolitical landscape. My insights and findings were vital in informing both our internal strategy and the cybersecurity posture of our clients.Collaboration and Knowledge Sharing: I actively collaborated with cross-functional teams, sharing my expertise and insights. This collaboration was essential in driving forward our collective understanding of emerging threats and refining our overall cybersecurity strategy.In this role, I not only honed my technical skills in malware analysis and reverse engineering but also developed a keen understanding of the strategic aspects of cyber intelligence, making significant contributions to the field of cybersecurity and national security. -
Security Engineer / Malware ResearcherSymantec Jul 2011 - Jun 2015San Jose, California, Us -
Senior Software EngineerProbance Jun 2010 - Jun 2011Saint Cloud, Île-De-France, FrIn my role as a Senior Software Engineer at Probance, a company at the forefront of AI-driven marketing solutions, I was deeply involved in several key aspects of software development and machine learning. My primary responsibilities and achievements included:Java Development: Leveraged my expertise in Java to develop robust, scalable software solutions. This involved working through the entire software development lifecycle, from concept to deployment, ensuring high-quality code and adherence to best practices in software engineering.Predictive Analysis and Machine Learning: Played a pivotal role in integrating predictive analysis models and machine learning algorithms into our software solutions. This included working with KXEN, a leading machine learning platform, to enhance the predictive capabilities of our products.Database Management: Was responsible for the design, implementation, and maintenance of complex database systems. This involved ensuring data integrity, performance optimization, and scalability to support our advanced analytics capabilities.Algorithm Implementation: Took the lead in implementing various algorithms, including the Apriori algorithm, among others. My work focused on enhancing data analysis capabilities and providing deeper insights into large datasets. This was crucial in driving data-driven decision-making processes for our clients. -
Software EngineerGeneral Electric Mar 2010 - Jun 2010Boston, Ma, UsContributed to the development of GE CT scanner software, widely used in hospitals, by implementing specialized iodine filters for enhanced arterial imaging. This work involved complex mathematical calculations on matrices, extensive use of C++ template programming, and advanced image processing techniques. This significant enhancement is expected to improve patient outcomes and potentially save lives. -
Red TeamGroupe Tf1 Feb 2009 - Jul 2009Boulogne Billancourt, Cedex, Fr -
Root (Yaka/Acu)Epita Aug 2007 - Jan 2009Kremlin Bicêtre, Fr -
C/C++ Teacher (Yaka/Acu)Epita Aug 2007 - Jan 2009Kremlin Bicêtre, Fr -
Software EngineerBnp Paribas Aug 2007 - Feb 2008Paris, FrC++, quantitative analysis
Taha K. Skills
Taha K. Education Details
-
Epita: Ecole D'Ingénieurs En InformatiqueComputer And Information Systems Security/Information Assurance -
Ionis-Stm, École De Double CompétenceInformation Technology Project Management -
Epita: Ecole D'Ingénieurs En InformatiqueComputer Science
Frequently Asked Questions about Taha K.
What company does Taha K. work for?
Taha K. works for Adverserial
What is Taha K.'s role at the current company?
Taha K.'s current role is Author and Writer - AI and Cyber Security.
What is Taha K.'s email address?
Taha K.'s email address is ta****@****ail.com
What schools did Taha K. attend?
Taha K. attended Epita: Ecole D'ingénieurs En Informatique, Ionis-Stm, École De Double Compétence, Epita: Ecole D'ingénieurs En Informatique.
What skills is Taha K. known for?
Taha K. has skills like Python, Networking, Java, Vulnerability Assessment, Network Security, Reverse Enginer, Security, Unix, Script Shell, Cloud Computing, Test D'intrusion, Perl.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial