Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Tag: technology

AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught

February 1, 2026 rioasmara

If you’ve ever had a beacon or Meterpreter payload flattened by AMSI, or watched your one-liner get flagged before it could even run, you know

Continue reading

Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations

January 22, 2026 rioasmara

By integrating CyberTriage with AI through the Model Context Protocol (MCP), incident responders can now leverage intelligent automation to dramatically accelerate forensic analysis and improve

Continue reading

The Silent Kill Chain: From RID Cycling to AD CS Template Injection

January 11, 2026 rioasmara

In modern Active Directory (AD) engagements, the path to Domain Admin is rarely paved with zero-day exploits. Instead, it is constructed from “features”—misconfigured permissions, legacy

Continue reading

Supercharging Velociraptor with AI and Cursor

December 18, 2025 rioasmara

Why Velociraptor Needs an AI Assistant Velociraptor is a powerful DFIR and threat‑hunting platform: it gives you deep endpoint visibility, flexible VQL hunts, and scalable

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
  • A malware analysis journey: Discovering process hollowing
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar