
The MOVEit Transfer Hack: Anatomy of a Supply Chain Attack
How a single SQL Injection vulnerability in a file transfer tool led to the theft of millions of records.
Thoughts, tutorials, and articles on Cybersecurity and Technology.

How a single SQL Injection vulnerability in a file transfer tool led to the theft of millions of records.

Why JNDI injection in Log4j broke everything, and why we are still finding it today.

The attack that shut down the US East Coast. Detailed analysis of DarkSide's RaaS model.

How state-sponsored actors are infiltrating critical infrastructure without malware.

How a simple Vishing call to the helpdesk cost a casino giant $100 million.

Why reusing passwords allows hackers to steal your DNA data.

Analyzing the record-breaking DDoS attack vector (CVE-2023-44487).

RF replay, NFC cloning, and why banning it solves nothing.

How attackers used deepfake video to steal $25 million.

Analyzing the BGP routing failure that disconnected millions.

From Project Chanology to the Cyber War in Ukraine.

Building a semi-autonomous content workflow using Make.com.

Revisiting the supply chain attack that changed everything.

The CIA Triad, OSI Model, and encryption basics.

Setting up credentialed scans and interpreting results.

Deep dive into web application security testing.

Verify Explicitly, Least Privilege, and Assume Breach.

Combatting gatekeeping in cybersecurity education.

My experience investigating a simulated malware outbreak.

The Arms Race: Polymorphic malware vs Anomaly Detection.