VDVishesh Dutt Sharmainsttudv.hashnode.dev00When Trust Has a Face ;)Apr 12 · 6 min read · Why write this? Recently, I began reading a well-known research survey that made me look at this topic differently: “Deepfake Generation and Detection: A Survey.” It examines how modern systems createJoin discussion
VDVishesh Dutt Sharmainsttudv.hashnode.dev00From Structure to ActionApr 5 · 4 min read · There is a moment in every investigation where structure must become action. Logs exist. Alerts trigger. Systems behave in ways that demand explanation. The question is no longer what the framework reJoin discussion
VDVishesh Dutt Sharmainsttudv.hashnode.dev00The Shape of an ATT&CKMar 29 · 5 min read · There is a certain way security incidents are often described. A system was “breached.” An account was “compromised.” Data was “exfiltrated.” The language is compact, almost compressed, as if a sequenJoin discussion
VDVishesh Dutt Sharmainsttudv.hashnode.dev00What an Image Is Allowed to HideMar 22 · 7 min read · You are looking at an image. Perhaps it is a meme. Perhaps it is a cat. These categories, as experience suggests, are not mutually exclusive. The image appears continuous—smooth gradients, coherent shJoin discussion
VDVishesh Dutt Sharmainsttudv.hashnode.dev00POV: You Double-Clicked an EXEMar 15 · 7 min read · Abstract Launching a program in Microsoft Windows appears deceptively simple. A user double-clicks an executable file and the program starts almost instantly. Beneath that simple action, however, WindJoin discussion