Cyberseurity

Defense & Intelligence
1714654761270

01.

About Me

I’m Ahmed Khormi, a cybersecurity professional specializing in Cyber Threat Intelligence (CTI) and SOC operations. With a Master’s degree in Cybersecurity and certifications including SANS CTI, I help organizations detect, analyze, and respond to cyber threats. I’m passionate about threat hunting, vulnerability discovery, and integrating AI into cyber defense. I’ve created global threat reports, built dashboards to monitor risks, and developed playbooks that strengthen SOC processes. Beyond the technical work, I enjoy sharing knowledge, leading teams, and raising awareness about emerging threats.

This space reflects my journey — the projects I’ve built, the reports I’ve published, and my commitment to making the digital world safer and smarter.

02.

Articles

Cyber Threat Claims & Activities in 2025

Executive Summary This report analyzes threat actor posts collected throughout 2025 from monitored sources (Telegram channels, Tor leak sites, and

feature 1.jpg

TEST ONE

ASDFDSMLFNDSLKFNDFSD\ ALKDSFJDS;KFSLDF ALKDSFJ;LKDSFJDSLKFJDSF ASDLKFJL;DSFJDSLKFJSDF

feature 2.jpg

Test

athasdfokasdjflksd;jfsadlkfjsdlkfjsdlfkjsdfsadf

feature 3.jpg

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

03.

My Creative Expertise

Combining intelligence with innovation to uncover threats, shape defenses, and drive cybersecurity forward.

Each effort is guided by purpose, turning data into clarity and challenges into opportunities for stronger protection.

1. Threat Intelligence & Analysis

Leveraging CTI platforms and OSINT to track threat actors, malware campaigns, and IOC patterns. Delivering actionable intelligence that maps directly to MITRE ATT&CK and enhances detection capabilities.

2. SOC Operations & Incident Response

Executing advanced SIEM queries, correlation rules, and EDR triage to detect and contain intrusions. Building playbooks that streamline incident response and reduce false positives across SOC L2 operations.

3. Cybersecurity Reporting & Awareness

Authoring global threat landscape reports covering vulnerabilities, exploits, and adversary TTPs. Presenting intelligence briefings and awareness sessions to strengthen organizational cyber resilience.