The Blog.

Written when I have something worth saying. These are writeups, not takes.

Threat Detection Feb 18, 2025

Your Antivirus Hasn't Caught Real Malware in Years

Signature-based AV was already outdated when I started in this field. Here's what a real detection stack looks like, and how you can replicate the important parts at home.

Read more →
Privacy Jan 30, 2025

The VPN "No-Log" Promise Is Mostly Marketing

I went through the actual privacy policies and court cases for nine major VPN providers. The gap between what they claim and what they deliver is significant.

Read more →
Windows Jan 12, 2025

Windows 11 Hardening: The Settings That Actually Matter

Microsoft buries the useful security controls under layers of UI that nudges you toward their cloud products. Here's what to actually change and why each one matters.

Read more →
SIEM Dec 28, 2024

How I Set Up a SIEM for Free Using Wazuh and Elastic

Enterprise-grade event monitoring doesn't require a budget. This is the exact setup I use for my home lab — the same principles apply to small business environments.

Read more →
Linux Dec 10, 2024

Linux Privilege Escalation: Where Most Systems Get Compromised

SUID binaries, writable paths, and misconfigured sudo rules show up in almost every pen test I've been part of. Here's what to look for and how to close the gaps.

Read more →
Phishing Nov 25, 2024

What a Live Phishing Kit Actually Looks Like

I captured three live phishing kits and broke down how they were built. Once you've seen the infrastructure, spotting these sites becomes second nature.

Read more →