PinnedUnpacking an IDOR-Based Exploit in International Shipping (70 Million+ PII Data Breach)How can a company worth Billions let simple security flaws slip through their system?Dec 2, 2024Dec 2, 2024
Inside Black Basta’s Exposed Internal Chat Logs: A Firsthand LookThe other day, I got my hands on Black Basta’s internal chat logs, a ransomware group known for causing over $100 Million in damages.3d ago3d ago
Published inMeetCyberThe SecOps Platform All Organizations NeedLimaCharlie and integrating Wazuh logs for full visibility6d ago6d ago
Published inMeetCyberBuilding an Open Source SIEM on AWS — Part 1From Ingestion to Correlation — A Step Toward a Production-Grade SolutionFeb 4Feb 4
Published inMeetCyberThe ONLY Hacking Tool You NeedWhat Penetration Testers don’t want you to know…Jan 303Jan 303
Outcomes vs. OutputHow often do we focus on what we’ve done rather than what we’ve achieved?Jan 21Jan 21
Hackers Don’t Care About You — But They Want Your ServerSize doesn’t matter. It’s what’s inside that counts.Oct 30, 2024Oct 30, 2024
How I Stopped a Data Breach In 2 Minutes: A Lesson on Insecure Direct Object…“Is this secure?” — The other day, a friend sent me a URL with a simple question.Oct 29, 2024Oct 29, 2024