Blog Posts
ICS Phishing: When Your Calendar Becomes the Attack Surface
- Red Team Tactics
- December 14, 2025
- 9 mins
How calendar invites become phishing payloads that bypass inbox controls and live inside trusted apps.
APT31 Today: When Trusted Cloud Infrastructure Becomes the Attack Surface
- Apt
- December 7, 2025
- 5 mins
How APT31 turned Microsoft Dev Tunnels, cloud storage, and signed binaries into stealthy command and control.
Shai-Hulud 2.0: Offensive Security Art in npm Worm Form
- Apt
- November 28, 2025
- 7 mins
How a self-propagating npm worm weaponized maintainer trust and GitHub Actions for covert C2.
CVE-2025-6514: How Old Bugs Hijacked the AI Hype
- Analysis
- September 15, 2025
- 7 mins
Breaking down the MCP remote command injection and why AI tooling just became an attacker playground.