<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Forensics on</title><link>/tags/forensics/</link><description>Recent content in Forensics on</description><generator>Hugo -- gohugo.io</generator><lastBuildDate>Thu, 06 Feb 2025 18:49:59 +0100</lastBuildDate><atom:link href="/tags/forensics/index.xml" rel="self" type="application/rss+xml"/><item><title>From Chatbots to Cyberattacks: How AI is Helping Hackers Stay One Step Ahead</title><link>/post/cloudflare/</link><pubDate>Thu, 06 Feb 2025 18:49:59 +0100</pubDate><guid>/post/cloudflare/</guid><description>As a CTF player, I&amp;rsquo;ve spent my fair share of time solving puzzles, inspecting vulnerabilities, and breaking RSA for the billionth time. I always thought my first malware analysis would come from a CTF challenge or perhaps an ominous-looking file I downloaded on purpose in the name of research. Little did I know, this initiation would come in the most unexpected way: my roommate accidentally infected my own machine.</description></item></channel></rss>