Security Blog

Detection Engineering · Zero Trust · Supply Chain · AI Security

Security Intelligence Archive

Deep technical analysis, threat research, and applied security engineering — from DEF CON 22 to the frontier of autonomous defense.

136
Posts published
3
Deep-dive series
27
Series episodes
14+
Years publishing


1
May 2026
Autonomous Incident Response at Scale: How Energy-Based Models & TAME Replace LLM Guessing in Security

Why do Fortune 10 SOCs with 15 people outpace teams 10x their size? They've stopped using autoregressive LLMs for threat modeling, response,...

Security Operations AI/ML Autonomous Systems
16
Apr 2026
Security Theater and Cap Tables: Deconstructing Cal.com's Closed-Source Pivot

Cal.com's 2026 transition to a closed-source model was publicly framed as a response to AI-driven security threats. This case study decomposes the...

Security Open Source Business Analysis
11
Feb 2026
Episode 2: The Layer 2 Bridge Lab

Migrating from /etc/network/interfaces to NetworkManager on Debian Trixie is a rite of passage. This lab walks through building a persistent Layer 2...

Homelab Networking Debian
13
Dec 2025
5 Mind-Bending Security Paradigms That Will Redefine How You Think About Infrastructure Deployments

We assume signed code happens in CI/CD pipelines. We assume certificates live for days or weeks. We assume trust is verified once...

Zero Trust Architecture Hardware Security Modules Ephemeral Credentials
12
Dec 2025
5 Mind-Bending Truths About API Security That Will Change How You Think About Trust

We've been thinking about API keys completely wrong. What if the most secure credential is one that literally can't exist for more...

Zero Trust API Security Cryptographic MPC
11
Dec 2025
The Security Pattern Most DevOps Teams Get Dangerously Wrong (And How Hardware Tokens Fix It)

Your Terraform state files contain the keys to your kingdom—database passwords, API tokens, private keys—all in one convenient JSON file. Yet most...

Infrastructure Security Hardware Security DevOps
10
Dec 2025
5 Mind-Blowing Secrets Behind Password-Less Database Provisioning (You Won't Believe #3)

In a world where database credentials are the crown jewels attackers covet most, what if I told you there's a way to...

Hardware Security Zero-Trust Architecture Dynamic Secrets
9
Dec 2025
5 Mind-Blowing Security Truths That Will Change How You Think About SSH Access Forever

Your SSH keys are sitting on your laptop right now. What happens when your device gets compromised? The answer is scarier than...

Hardware Security Zero Trust Architecture SSH Certificate Authority
8
Dec 2025
5 Mind-Bending Ways Hardware Security Keys Are Revolutionizing API Authentication

We've been thinking about API keys all wrong. What if the secret to unbreakable authentication isn't stored anywhere at all?

Hardware Security API Gateway Zero-Trust Architecture
7
Dec 2025
5 Mind-Bending Truths About SSH Authentication That Will Change How You Think About Security

We've been doing SSH authentication wrong for decades. What if I told you that your SSH keys, password managers, and even your...

Hardware Security Zero Trust Architecture Cryptographic Authentication
6
Dec 2025
Forget HR Systems: Why Your Next Identity Provider Should Be a Piece of Plastic

We've spent decades building complex identity pipelines rooted in databases and HR software. What if the single source of truth for your...

Infrastructure as Identity Zero Trust YubiKey
5
Dec 2025
5 Surprising Lessons from Building a Cross-Cloud Credential Rotator

Managing secrets across one cloud is hard. Managing them across two, synchronously, is a masterclass in distributed systems engineering.

Cloud Security DevSecOps AWS
4
Dec 2025
5 Mind-Blowing Insights About Hardware-Backed Authentication That Will Change How You Think About Cloud Security

We've all been there; another leaked API key, another compromised credential, another midnight emergency call. The traditional approach to cloud security—rotating passwords,...

Cloud Security Hardware Authentication FIDO2
3
Dec 2025
The Password Crisis Nobody Talks About: 5 Surprising Lessons from Hardware-Rooted Cloud Security

We've all been there - juggling AWS access keys, rotating credentials quarterly, and praying that developer laptop that went missing last month...

Cloud Security Hardware Authentication YubiKey
2
Dec 2025
Righty Tighty: The "Physics-Compliant" Approach to Cross-Cloud Security

We’ve all been there - juggling long-lived AWS access keys, managing OCI config files, and praying that the "secret" API token committed...

Cloud Security Multi-Cloud OCI
2
Dec 2025
Your Security Agent Isn’t Broken—It’s Just Optimizing the Wrong Universe

We've spent decades perfecting code correctness—yet some of the costliest failures come from agents doing exactly what we told them to do....

AI Security Security Agents Cognitive Light Cone
17
Nov 2025
7 Ways zk-Autograd Reimagines Trust in AI Training (One Gradient Step at a Time)

We talk about “trusting” AI models, but almost no one can prove how they were actually trained. zk-Autograd treats every gradient step...

Autonomous Security AI Supply Chain Zero-Knowledge Proofs
14
Nov 2025
Why Your Next Security Architecture Should Be Ephemeral (and Why We Built It That Way)

We built a signing service that doesn't trust its own keys. Here's why that's the future of security.

Confidential Computing MPC Zero Trust
9
Apr 2025
7 Ways Mimir Makes LLMs Safe Enough for People Who Don’t Trust Each Other

In most LLM systems, someone has to trust someone else with raw prompts or weights. Mimir shows what happens when nobody is...

Autonomous Security Zero-Trust AI Secure Multiparty Computation
6
Dec 2023
Embracing the Cyber Age- The Art of Adaptability in Security Engineering

In the dynamic and ever-evolving realm of digital technology, the need for adaptability in combating cyber threats has never been more pronounced....

Cybersecurity Security Engineering Adaptability
27
Nov 2023
Securing the Digital Frontier- The Essential Role of Education in Tech Literacy and Security Awareness

In the rapidly evolving digital landscape, where technology deeply permeates every facet of our lives, the importance of tech literacy and security...

Cybersecurity Tech Literacy Security Awareness
23
Nov 2023
The Tightrope Walk- Balancing Security Engineering and Privacy in the Tech World

In the rapidly evolving world of technology, a critical and often controversial issue stands at the forefront the balance between robust security...

Cybersecurity Privacy Engineering Ethical Frameworks
21
Nov 2023
Embracing Decentralization- The Future of Democratic Oversight and Security Engineering

In an era where digital technology is not just a tool but a societal cornerstone, the concepts of democratic oversight in technology...

Cybersecurity Decentralized Security Blockchain
8
Nov 2023
Annabel's Cypherpunk Manifesto

It was many and many a year ago, In a realm of digital glow, That the Cypherpunks came to know, A love...

Cybersecurity Cyber Risk Management White House Cybersecurity Executive Order
31
Mar 2023
2023 update to 2021 White House Cybersecurity Executive Order

I realized I needed to update the 2021 White House Executive Order …Improving the Nation’s Cybersecurity fundamentals outline. In order to scale...

Cybersecurity Cyber Risk Management White House Cybersecurity Executive Order
8
Feb 2023
Striking the Right Balance- Innovation and Regulation in Security Engineering

In the fast-paced world of technological advancement, balancing innovation with regulation is a crucial challenge, especially in the field of security engineering....

Security Engineering Innovation Regulation
16
Dec 2020
Intel Sharing Metrics

I pulled some metrics from my threat intelligence sharing service to generate cute charts and graphs. If you want to keep up...

Threat Intelligence Metrics Cybersecurity
16
Feb 2020
Failure to meet operational excellence

One would think to rotate their certificates months prior to expiration. Or even the bare minimum

Operational Excellence Security Best Practices Certificate Management
29
Nov 2019
17
Sep 2019
Kubernetes CI / CD And Monitoring Pipelines

When one takes a step back and looks at a typical agile build, test, and release pipeline with a security bent; one...

Kubernetes CI/CD Monitoring
26
Jul 2019
Kubernetes Pods (PodSec policies)

Pods hardening is strongly configured and enforced with Pod Security policies (PodSec.). The security context enables not to restrict privileges, volume mounts,...

Kubernetes Pod Security Security Policies
25
Jul 2019
Kubernetes Containers

When we get into the specifics for containers, the challenge is that the detailed advice differs greatly between the different container technologies....

Kubernetes Containers Container Security
24
Jul 2019
Kubernetes Networks - CNI

Within Kubernetes, networks are an interesting beast. They become extremely muddled

Kubernetes Networking CNI
24
Jul 2019
Kubernetes Master Node & Nodes

One will wish to replicate their Master node to minimize downtime events. These nodes will host the control plane building blocks

Kubernetes Master Node Worker Nodes
23
Jul 2019
Kubernetes Scheduler

Overview

Kubernetes Scheduler Resource Management
16
Jul 2019
Kubernetes Information Security Practices

We sponsored a Kubernetes security review because of its’ popular adoption, glaring insecurities, default insecure states, wasn’t designed to be secure, and...

Kubernetes Information Security Vulnerability Scanning
13
Jul 2019
What is a modern, dynamic service and its' building blocks?

As I work through the ecosystem, there is no evident, leading best practice.

Cloud Native Modern Services Containerization
11
Jul 2019
Nginx exploit writing weekend

This weekend will be ripe of opportunities for nginx exploit writing. Trying a new scheduler algorithm and Stensal's compiler against nginx's stable...

Nginx Exploit Writing Fuzzing
5
Jul 2019
Kubernetes Basics

Let’s take a look at the simplest part of the previously documented multi-tenancy architecture

Kubernetes Cloud Security Containerization
29
Jun 2019
What does it take to break into a Cloud Service?

Sometimes, all it takes is cp and rsync. See the image below for an example.

Cloud Security Exploitation File Transfer
6
Mar 2019
When your SIEM models are not enough

Just when I thought every bit of value was squeezed from the systems, it is continuing to pull out indicators and APT...

SIEM Vulnerability Models APT Detection
12
Jan 2019
OSX First Responder - Threat Artifact Gathering

How you go about hunting down malware on a macOS endpoint depends a great deal on what access you have to the...

MacOS Threat Hunting Malware Detection
30
Nov 2018
Memory Safety Code Review

Some of our keen readers may have noticed that if the size of userPass is less than 9, then overflow will still...

Memory Safety Buffer Overflow CWE 120
8
Sep 2018
Solving 90% of application security defects with a proven technique

Even when validation is used, a common mistake is to use block lists. For example an application will prevent symbols that are...

Application Security Input Validation OS Command Injection
8
Sep 2018
Data Controls Code Review

The number of user records exposed in the United States has been in the billions in 2016 and 2017. 2018 will likely...

CIA Triad Confidentiality Data Protection
7
Sep 2018
Binding Parameters

Notice that the single quote in the name O’Brien is causing a syntax error. The SQL command processor considers the string ends...

Injection SQL Injection Input Validation
5
Sep 2018
Overly Simplistic Crypto Code review

Confidentiality is one of Information Security

Cryptography Secure Coding Data Protection
11
Jul 2018
For those who wonder what a Digital authentication cyber arms race looks like

It is heavy on the technical content but is entertaining if you spend the time understanding the language.

Authentication Cybersecurity Browser Security
30
Apr 2018
First 100 Days

A friend took up a new InfoSec executive career path but didn't know how to start. She reached out to me and...

Infosec Leadership Executive Onboarding
16
Jan 2018
The pending crypto singularity

Recently penned by Peter, it is worth a read. Especially for those who are concerned about putting all of their eggs in...

Cryptography Security Engineering Protocol Design
10
Oct 2017
Creating a Loki Splunk application

One tool that has caught my interest is the [Loki APT scanner

Threat Hunting Incident Response APT Detection
8
Sep 2017
Serious XSS affecting Wikipedia

XSS vulnerability in thumb.php in Wikipedia Mediawiki

Vulnerabilities Web Security XSS
7
Sep 2017
Defense Against the Dark Arts

Thankfully, Naurus has produced a useful infographic to understand the variety of malicious entities. While it is not all inclusive, it suffices...

Threat Modeling Cybersecurity Infographics
5
Apr 2017
Walking the Dark Deep Web

During Black Hat, BsidesLV, and Defcon, I ended up having a chat with Justin Seitz about his nifty OSINT automation. I decided...

Dark Web OSINT Cybersecurity
15
Aug 2016
DARPA Cyber Grand Challenge era coming to a close

This Thursday, seven research institutions will compete against each other. Unlike other typical hacker challenges, their automations will compete on their behalf....

Cyber Grand Challenge DARPA Red Teaming
22
Mar 2016
Multiple vulnerabilities in SecurityOnion

Let this be a reminder of the joys in programming PHP

SecurityOnion Vulnerabilities PHP Security
22
Mar 2016
Relatively Free

From my text library, this is list of software

Free Resources DevOps SaaS
19
Feb 2016
Ransomware hitting linux hosting providers

It will be interesting to watch the infection spread on Google Trends

Ransomware Linux Hosting Providers
15
Nov 2015
DARPA Cyber Grand Challenge dropbox

I have been taking lessons learned from DARPA’s Cyber Grand Challenge and applying it to our automation

DARPA Cyber Grand Challenge CTF
16
Aug 2015
Hotpatch Redis's RCE

Do you feel lucky

Redis RCE Exploit Development
11
Jul 2015
Ingenious CTF dashboard

As taken from a dummy account, I wish more CTFs were setup like this. [#Polictf](https://twitter.com/search?q=%23Polictf) 2015

CTF dashboard infosec
2
Jul 2015
Destroy a City - secure code review

It should be noted that no ethically-trained software engineer would ever consent to write a DestroyBaghdad procedure

secure coding software ethics code review
14
Jun 2015
Social Engineering Confirmation Bias workflow

The image below shows the role confirmatory bias can play in social engineering exploits. Two situations are depicted. In the first, the...

social engineering confirmation bias insider threat
14
Jun 2015
Redis RCE

If you haven't already, time to patch Redis. Otherwise, please setup authentication in front of your Redis instance. This remote code execution...

Redis RCE remote code execution
10
Jun 2015
ElasticSearch honeypot dataset

I have uploaded a new ElasticSearch honeypot dataset. It appears there are a few individuals who are attempting to exploit a few...

ElasticSearch honeypot dataset
18
May 2015
Ghcq Challenge Completed

View fullsize

GCHQ cyber challenge puzzle solving
21
Apr 2015
Impressive Node.JS vulnerability reduction

In 2013, when I last performed a secure code review on Node.JS, it did not look pretty.

NodeJS vulnerability reduction secure coding
15
Apr 2015
Need help figuring out a Snapchat username? I have your back.

I can’t tell you what makes a good Snapchat username. But what I can tell you is what makes a popular Snapchat...

Snapchat username tips social media trends
14
Apr 2015
Yet another nail in SSL TLS 's coffin

RC4 has long been considered problematic, but until very recently there was no known way to exploit the weaknesses

SSL TLS RC4 vulnerability
2
Apr 2015
Technical Approaches to Determining if an Incident Occurred

When addressing potential incidents and applying best practice incident response procedures

incident response cybersecurity best practices IOC detection
20
Mar 2015
Open Source Fairy Dust Datasets

The current list of open source critical infrastructure services vulnerability metrics I have released and / or made public

open source insecurity machine learning vulnerabilities vulnerability mountain
20
Mar 2015
Checkbox AWS assurance testing?

A great beta tool to checkbox their AWS infrastructure and account to known AWS controls. [ Scout2

AWS security Scout2 cloud assurance
1
Dec 2014
LDAP Tool Box vulnerabilities

This vulnerability allows one to bypass weak XSS filtering

LDAP Tool Box XSS vulnerability htmlentities weakness
27
Jun 2014
How to sell a story - Ira Glass

If you are just starting this phase, still in this phase, getting out of this phase, you gotta know

Ira Glass creative process storytelling
15
Apr 2014
Please donate to a worthy crypto security cause

If you have ever used OpenSSL, [please donate money to this worthy cause

OpenSSL Heartbleed cryptographic security
7
Apr 2014
Bug Age - Pattern series

I love standards. My blackhat persona says this makes it easy to break into systems

bug patterns code insecurity secure coding
7
Mar 2014
Chrome's V8 double free vulnerability

Within Chrome's V8 engine, this was an interesting double free vulnerability I uncovered. Thank you V8 team for accepting.

Chrome V8 double free vulnerability memory corruption
12
Nov 2013
NodeJS vulnerabilities - it hurts to look

Background

NodeJS JavaScript security backend vulnerabilities
31
Jul 2013
Google Translate

the translated website pops out of Google Translate's iframe and redirects the user to a website or content of their choosing

Google Translate web vulnerability iframe hijacking
27
Jun 2013
Random thought for an exploding honey token

I remember when Nuxi and I would create computationally compact compressed files and see which mail servers would attempt to inspect the...

honey tokens compressed file attacks mail server vulnerabilities
27
Jun 2013
Carberp Vulnerabilities Cc Pie

I logged into Reddit this morning and observed Carberp

Carberp malware analysis cryptographic vulnerabilities
23
Jun 2013
Apache Batik parse double vulnerability

It is interesting to see Batik's parse double vulnerability exist to this day. Anyone want to crash Opera or popular, open source...

Batik vulnerability parse double bug Apache Batik
22
Jun 2013
DAQ buffer overflows

Sourcefire and snort vulnerabilities allow remote code execution

buffer overflows software vulnerabilities code analysis
5
Jun 2013
Malicious mobile power station

A bit back, I looked over Stavrou USB smartphone paper evil power station

USB security vulnerabilities smartphone security malicious USB attacks
5
Jun 2013
Startup Comp Structure

You

startup compensation equity compensation executive recruitment
4
Jun 2013
Lazy AWS devops

I am seeing too much echo chamber, saber rattling, foolish dogma about agile SA

DevOps agile SA cloud security tools
9
May 2013
Security is hard. Security Tools are harder. Cloud Security Tools are hardest.

There are tools, security tools, and then there are cloud security tools. Especially in the realm of security orchestration. Many cloud snake...

cloud security tools security orchestration vulnerability management
6
May 2013
CNN.com XSS vulnerabilities

CNN fixed two XSS issues. Congrats

CNN XSS issues security updates
3
May 2013
Google Glass Developer program - more DOS and XSS

There were two very simple Google Glass Mirror's quickstart DOS and XSS vulnerabilities. The fixes have been introduced in changeset https

Google Glass Mirror API DOS vulnerability
19
Apr 2013
Google Glass 0days

Jenny Murphy has some clean code. However, it isn't the most secure. The Google Glass team must be under an intense timeline....

Google Glass software development lifecycle vulnerabilities
17
Apr 2013
Evolutionary hardware

For technical problems, one may struggle to define the specifications. When this happens, look at the behavioral design. Then one may find...

evolutionary algorithms soft computing design automation
11
Apr 2013
Rapid7 Google hacks extended

How many other file sharing services are affected by the inadvertant sharing of sensitive information

data leakage S3 bucket security sensitive information
5
Dec 2012
Nifty Anti-XSS validation tool - Snuck

To significantly test a given XSS filter by specializing

Snuck XSS filter testing security tools
10
Oct 2012
Firesale WebPanel botnet 0days

Oh, Firesale WebPanel botnet. How entertaining it is to see you continue to raise your head over the years.... XSS Reflected

Firesale WebPanel botnet reflected XSS DOM-based XSS
2
Oct 2012
ERM - How did WOPR decide the only winning move is not to play?

WOPR evolved and learned while playing against himself

WOPR evolutionary algorithms hardware simulation
26
Sep 2012
DPAPI still applicable?

I saw some code utilizing DPAPI. Given the research around MS's poor DPAPI implementation,

DPAPI Microsoft security credential protection
2
Aug 2012
Security quotes

The present need for security products far exceeds the number of individuals capable of designing secure systems

security quotes NSA jokes software liability
15
Jul 2012
Management Wednesday- BPM Modeling - not charts anymore

After one has accomplished the scoping phase, then the team should move on to modeling. Due to the large amount of time...

business process modeling scoping phase UML
25
Jun 2012
Microsoft revokes Microsoft's certificate

It is a sad day when a PKI private key signing software is able to sign code on behalf of Microsoft. Especially...

PKI private key signing code signing vulnerability Microsoft security breach
29
May 2012
Gribodemon on SpyEye 2.x - I expected better

Saturday, I noticed my application honeypot collected an interesting sample. The cracker took my bait and attempt to hack the planet via...

application honeypot SpyEye malware sandbox evasion
26
May 2012
Airing one's dirty development laundry - You are doing it wrong

I recieved a lovely google alert this weekend.

Google alert private key exposure security breaches
23
May 2012
Bitcoins are hard to track

Either FBI

FBI and Bitcoin currency exchangers Bitcoin to WebMoney
22
May 2012
Sad reality

hope you have a gating process in your finance team which halts the ability to pay vendors without security approval...

finance team gating process vendor payments security approval
17
May 2012
Management Wednesday- BPM scoping

In business process management, there is no defined starting point. The solutions are transposable, adaptive, and can be set into motion regardless...

business-process-management project-scoping process-models
15
May 2012
PHP - two simple wins and a hammer

I love programming in PHP. Fairly simple to learn, easy to code, plenty of tools available, and great community. However, due to...

PHP programming learning PHP PHP security
2
May 2012
Meltdown exploits

Here is an academic exercise to create the Meltdown exploit prior to publication on Jan. 9th. To keep honest with my CISSP...

Meltdown exploit CISSP certification ethical hacking
20
Apr 2012
Management Wednesday- BPM isn’t beats per minute.

I was chatting with Alexander Peters and he mentioned an interesting statistic.

business process management management practices change initiatives
7
Apr 2012
Management Wednesday - Negotation

Management 101 - Negotiating Observe yourself negotiating The more time one spends preparing is directly related to win

management wednesday negotiation techniques value creation
2
Apr 2011
Web Application Security Dojo 'grams

While finding innovative methods to visualize various web application insecurity practices, I came across a great visual aid. Enjoy. Credit

web application security visual aid insecurity practices

2026
2025
2023 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011

Purple dot indicates a post that is part of a named series. Start at Episode 1 for the full arc.