Writing

Blog

Topics include:

Cybersecurity breakdowns, tool reviews, and lessons from building AI-powered security tools.

CybersecuritySupply ChainIntelligence OperationsGeopolitics

How Israel Used a Fake Company and Exploding Pagers to Dismantle Hezbollah's Command Structure

Operation Grim Beeper was not a cyberattack. It was a nine-year supply chain operation that ended with thousands of explosives detonating simultaneously inside devices Hezbollah believed were secure. Here is the full story.

8 min read
Read →
CybersecuritySurveillanceChinaPrivacyPolicy

China's Surveillance System Is Not What You Think

The Orwellian single score tracking every citizen's behavior does not exist. What does exist is a trillion-dollar governance infrastructure that is quietly being exported globally, and that is the story worth understanding.

7 min read
Read →
CybersecuritySocial EngineeringAIDeepfakesAwareness

Deepfake Voice Fraud Is Here, and Your Ears Cannot Be Trusted

1 in 4 Americans received a deepfake voice call in the past year. Voice cloning has crossed the indistinguishable threshold. The gift card scam I wrote about last week just got a lot harder to detect.

7 min read
Read →
CybersecurityAIThreat IntelligenceMalware

AI Is Now Being Used to Hack at Scale, and CyberStrikeAI Is Proof

An open-source AI attack platform was just used to compromise over 600 firewalls across 55 countries. The attacker was low-skilled. That is the point.

6 min read
Read →
CybersecurityPhishingSocial EngineeringScamsAwareness

The Gift Card Scam That Still Works, and How to Stop It

Someone impersonated my friend's boss and convinced her to buy gift cards for a work event. This is how the scam works, why it's so effective, and how to defend against it.

6 min read
Read →
HostingVercelWeb DevelopmentDevOps

Hosting Options Explained: How to Choose the Right One for Your Project

Shared hosting, VPS, cloud platforms, edge deployment, there are more ways to host a website than ever. Here's how I think about choosing the right one.

4 min read
Read →
Incident ResponseCrowdStrikeCybersecurity

What the CrowdStrike Outage Taught Me About Incident Response

The July 2024 CrowdStrike outage took down 8.5 million Windows machines in hours. The technical cause was one thing. The incident response lessons are another entirely.

3 min read
Read →
AICybersecurityCareer

Why Every Cybersecurity Professional Needs to Understand AI Right Now

AI isn't just a tool for developers anymore. It's reshaping the threat landscape and the defender's toolkit simultaneously, and cybersecurity pros who ignore it will fall behind.

5 min read
Read →
SplunkELKSIEMTool Review

Splunk vs ELK Stack, My Honest Take After Using Both

I've used both Splunk and the ELK Stack in real security work. Here's what the comparison articles don't tell you.

3 min read
Read →
CMMCComplianceCybersecurity

Why CMMC 2.0 Is Harder to Implement Than People Think

Everyone talks about CMMC compliance like it's a checklist. After working with it hands-on, I can tell you it's anything but.

3 min read
Read →