Posts

I Left Port 22 Open On My Server.Here's Who Showed Up

54,000 attacks in 48 hours. That is the reality of the modern internet. I deployed a Cowrie honeypot on Azure to analyze the background noise of the web. From the "Outlaw" crypto-mining group to Mirai-variant IoT scanners, this post breaks down the specific scripts, passwords, and signatures attackers used to try and hijack my serve

Read more →

Judgment is the New Benchmark: Why AI Can't Replace Human Intent

Big tech is chasing parameters, but AI lacks the one thing that matters: judgment. This post explores why social engineering is AI's biggest vulnerability and why human intent is more crucial than ever.

Read more →

Beyond Malware: How Hackers Use Your Own Tools Against You

Imagine a burglar having your house keys.... What are "Living Off the Land" (LOLBin) attacks? Learn how hackers use your system's own trusted programs (like PowerShell) to hide their activity and bypass security.

Read more →