Youssef B.
Editorial reviewer · Automated content streams
Role at Yazoul
Youssef reviews the daily threat-intelligence content drafted by Yazoul's automated pipeline before it goes live. Articles in the streams below are drafted with large-language-model assistance from public sources (NIST NVD, CISA KEV, HIBP, abuse.ch, news feeds) and pass through editorial review for accuracy, severity, and source-linking before publication.
He does not write the manually authored offensive-security research at /research/ — that section is written by Yassine B.
Content streams reviewed
- CVE advisories — newly disclosed and actively exploited vulnerabilities
- Data breach reports — disclosed breaches with impact analysis
- Cybersecurity news — multi-source correlated reporting
- Threat intelligence — ransomware victim claims (explicitly unverified)
- Malware tracking — family-level activity and IOC summaries
- Learning resources — long-form guides
Editorial standards
The full sourcing, scoring, and content-production process — including the gates each article passes through before publication — is documented on the Methodology page.
Contact
Editorial questions or corrections: [email protected].