SD
Sma DasSecurity Engineer
Sma Das Signature

Cybersecurity professional writing about security research, programming, and technology.

hello@sma-das.com

Pages

  • About
  • Blogs
  • Contact

Topics

  • Cybersecurity
  • Programming
  • Malware Analysis

Connect

  • LinkedIn
  • GitHub
  • Email

© 2026 Sma Das. All rights reserved.

Privacy PolicyTerms of Use
SD
Sma DasSecurity Engineer
Sma Das Signature

Cybersecurity professional writing about security research, programming, and technology.

hello@sma-das.com

Pages

  • About
  • Blogs
  • Contact

Topics

  • Cybersecurity
  • Programming
  • Malware Analysis

Connect

  • LinkedIn
  • GitHub
  • Email

© 2026 Sma Das. All rights reserved.

Privacy PolicyTerms of Use
SD
Sma DasSecurity Engineer
Sma Das Signature

Cybersecurity professional writing about security research, programming, and technology.

hello@sma-das.com

Pages

  • About
  • Blogs
  • Contact

Topics

  • Cybersecurity
  • Programming
  • Malware Analysis

Connect

  • LinkedIn
  • GitHub
  • Email

© 2026 Sma Das. All rights reserved.

Privacy PolicyTerms of Use
The Phish from Within
Venture capitalphishingfinance

The Phish from Within

An in-depth analysis of AI-powered anti-phishing startups and the most sophisticated phishing operation in corporate history - targeting venture capital portfolios instead of corporate inboxes.

Sma Das·Tuesday, January 20, 2026
Certified in Confusion²
certificationscybersecuritycareer

Certified in Confusion²

Certifications are expensive and promise you the moon; but only their costs can reach the moon.

Sma Das·Sunday, January 18, 2026
The Stealer Log Ecosystem: Processing Millions of Credentials a Day
cybersecuritymalwareresearch

The Stealer Log Ecosystem: Processing Millions of Credentials a Day

An in-depth analysis of the evolving stealer malware ecosystem, from Telegram channels to credential marketplaces, and how organizations can protect themselves.

Sma Das·Thursday, January 15, 2026