Blog
Stay with me while I'm exploring the ever-evolving landscape of cybersecurity, DevOps, and cloud computing—digging into what works, what's changing, and why it matters.

Dec 21, 2025
development7 min read
The EDR Killer: How Malware Hides Inside Windows
Discover how Shanya manipulates the Windows PEB to vanish from EDR detection.

Dec 8, 2025
security8 min read
Catching up on Cryptography
Breaking down cryptography basics: symmetric vs asymmetric encryption, stream vs block ciphers, hashing, and digital signatures.

Nov 9, 2025
security3 min read
The ASN Shell Game: How Criminals Evade IP Blocklists
Learn how cybercriminals shuffle IP blocks between ASNs to evade blocklists. The Ukrainian FDN3 case reveals infrastructure patterns defenders can track.
Showing 1-3 of 4 posts