PinnedUnpacking an IDOR-Based Exploit in International Shipping (70 Million+ PII Data Breach)How can a company worth Billions let simple security flaws slip through their system?Dec 2, 20241Dec 2, 20241
Fixing GRUB Rescue Error During Windows Update on Your Dual Boot SystemToday, I decided to update Windows on my Windows/Linux dual boot system. After leaving it alone for 20 minutes, I returned to find the…Mar 13Mar 13
Published inMeetCyberSay This Instead: Quantifying Cybersecurity RisksHow to convey your organization’s needs, in a language anyone can understandMar 7Mar 7
The Financial & Legal Impact of a Cyberattack: A Personal ReflectionKey insights to business security risks and how easy it is to remediate themMar 5Mar 5
Published inMeetCyberInside Black Basta’s Exposed Internal Chat Logs: A Firsthand LookThe other day, I got my hands on Black Basta’s internal chat logs, a ransomware group known for causing over $100 Million in damages.Feb 213Feb 213
Published inMeetCyberThe SecOps Platform All Organizations NeedLimaCharlie and integrating Wazuh logs for full visibilityFeb 18Feb 18
Published inMeetCyberBuilding an Open Source SIEM on AWS — Part 1From Ingestion to Correlation — A Step Toward a Production-Grade SolutionFeb 4Feb 4
Published inMeetCyberThe ONLY Hacking Tool You NeedWhat Penetration Testers don’t want you to know…Jan 303Jan 303
Outcomes vs. OutputHow often do we focus on what we’ve done rather than what we’ve achieved?Jan 21Jan 21