Writing
Blog
Cybersecurity breakdowns, tool reviews, and lessons from building AI-powered security tools.
How Israel Used a Fake Company and Exploding Pagers to Dismantle Hezbollah's Command Structure
Operation Grim Beeper was not a cyberattack. It was a nine-year supply chain operation that ended with thousands of explosives detonating simultaneously inside devices Hezbollah believed were secure. Here is the full story.
China's Surveillance System Is Not What You Think
The Orwellian single score tracking every citizen's behavior does not exist. What does exist is a trillion-dollar governance infrastructure that is quietly being exported globally, and that is the story worth understanding.
Deepfake Voice Fraud Is Here, and Your Ears Cannot Be Trusted
1 in 4 Americans received a deepfake voice call in the past year. Voice cloning has crossed the indistinguishable threshold. The gift card scam I wrote about last week just got a lot harder to detect.
AI Is Now Being Used to Hack at Scale, and CyberStrikeAI Is Proof
An open-source AI attack platform was just used to compromise over 600 firewalls across 55 countries. The attacker was low-skilled. That is the point.
The Gift Card Scam That Still Works, and How to Stop It
Someone impersonated my friend's boss and convinced her to buy gift cards for a work event. This is how the scam works, why it's so effective, and how to defend against it.
Hosting Options Explained: How to Choose the Right One for Your Project
Shared hosting, VPS, cloud platforms, edge deployment, there are more ways to host a website than ever. Here's how I think about choosing the right one.
What the CrowdStrike Outage Taught Me About Incident Response
The July 2024 CrowdStrike outage took down 8.5 million Windows machines in hours. The technical cause was one thing. The incident response lessons are another entirely.
Why Every Cybersecurity Professional Needs to Understand AI Right Now
AI isn't just a tool for developers anymore. It's reshaping the threat landscape and the defender's toolkit simultaneously, and cybersecurity pros who ignore it will fall behind.
Splunk vs ELK Stack, My Honest Take After Using Both
I've used both Splunk and the ELK Stack in real security work. Here's what the comparison articles don't tell you.
Why CMMC 2.0 Is Harder to Implement Than People Think
Everyone talks about CMMC compliance like it's a checklist. After working with it hands-on, I can tell you it's anything but.