Writing
Articles, publications, and blog posts over the years.
2015 – 2020
- In Cybersecurity, Best Practices Are The Worst — Forbes
- Hackers Play Dirty, So Practice Good Digital Hygiene — Forbes
- Fear And Loathing In Cyberspace — Forbes
- To Break The Rules Of Cybersecurity, You Must Know The Rules Of Cybersecurity — Forbes
- Don't Let Your Fear Of Nation-State Hackers Blind You — Forbes
- Demystifying Criminal Hackers — Forbes
- Defending Against Hacking's Long Game: It Ain't Over Til It's Over — Forbes
- Advanced Persistent Threats: Calling The Hackers' Bluffs — Forbes
- When Good Tech Goes Bad — Forbes
- Do You Do Security Due Diligence Before A Merger Or Acquisition? — Forbes
- Staying One Step Ahead Of Criminal Hackers — Forbes
- Were You Attacked Today With Yesterday's Hacking Technique? — Forbes
- Fixating On Vulnerabilities Is A Vulnerability — Forbes
- The Key To Cybersecurity: Shared Intelligence And Industry Cooperation — Forbes
2012 – 2013
- Personal Blog — blog.ikotler.org
2011
- (Hebrew) כשהווירוס מחייג אליך למשרד — Calcalist
- Botnet That Dial Home — Hakin9 Magazine, Extra Issue (October)
- Can You Hear Them Hacking — SecVoip Blog
- Ready or Not Industrial Cyber Warfare Comes — Enterprise IT Security Magazine (May)
- Click, Click, Boom: Industrial Cyber Warfare Already Here — Global Security Magazine
2009
- Malware Attacks the Software Update Process — Enterprise Systems Journal
2008
- The Dangers of Web 2.0 — Security Matters Magazine
- Web 2.0: Attack of the JavaScript Malware — SC Magazine US
2007
- Shellcodes Evolution — Hakin9 Magazine, Issue 1 (January)
2006
- Exploiting with linux-gate.so.1 — NewOrder Newsletter, Issue 13
2005
- Linux Improvised Userland Scheduler Virus — Uninformed Journal, Volume 3
- Smack the Stack (Advanced Buffer Overflow Methods) — Proceedings of 22C3
- Reverse Engineering with LD_PRELOAD — NewOrder Website
- Abusing .CTORS and .DTORS for Fun and Profit — NewOrder Website
- 10,000 Monkeys and a Webpage — NewOrder Newsletter, Issue 12