Category: Uncategorized

  • Censys Scanners Are Next Level

    I’ve been on a roll lately. A low key role. I’ve breached some of the best companies across the globe in finance/comms/defi and more. This has attracted a ton of attention it seems. Quite often I need listeners like python http server, nc, or today an advanced TLS socket listener. Today I left it open…

  • Singapore’s Telecom Apocalypse: China-Linked Hackers Infiltrate Major Carriers in Epic Cyber Espionage

    CyberNewsBlog – Exclusive Deep Dive | February 18, 2026 Intro: Singapore is the nation state responsible for most of the cyber fingerprinting I described just this week in the url above. It’s consistent, professional, and heavily hints toward an elite apt group. That wager is still on btw, so read that article, and let’s share…

  • Singapore Keeps Probing the Site –

    Every website gets its share of background noise, but lately my Slimstat Analytics logs have been lighting up with something different. This has been going on for weeks. I’ve been so busy lately, among a slew of other stuff. A single actor — or at least a single automated system — keeps hitting my /page/9/…

  • Interesting User Agents

    Over the course of consulting engagements over the past few weeks, I’ve used socket listeners quite often due to their usefulness. In doing so, I would meet my goals but also opened up my testing vm box to possible threats and some unique new user agents most have never seen before. The first one below…

  • Update

    Quick update. I’ve recently exploited 5 of the best companies across the globe. 4 led to rce, 1 led to me being able to scan their entire network segment and do LFI scanning as well. 1 led to a ROOT level shell into their core docker node that’s responsible for the entire companies’ session tokens,…

  • German User Leaves Epic Xss payload

    Just last week or so, while I was going over my real time analytics I noticed an interesting payload tied to 1 particular users web visit. I was scanning over Slimstat real time analytics. This shows visits (active, and intraday). Slimstat is great for this, and also, I think I was behind by 3 updates…

  • Crowdstrike Insider Threat

    The CrowdStrike insider threat incident in November 2025 stands as a crucial illustration of how the insider threat continues to be a top concern, regardless of an organization’s size or technical sophistication. Despite advanced defenses and frequent penetration tests (pentests), the insider threat remains uniquely positioned to bypass security measures, highlighting why it demands special…

  • Chinese CyberAttack – China Doesn’t like Us

    China is not happy with me. I was recently glancing over this site’s analytics and noticed something interesting that occurred beginning Oct 30th. Before I address the 2 events that I’m going to write about, just as I currently write about them, I’m also currently addressing a DMARC / DKIM email spoofing attempt from this…

  • Sacramento Pentest

    From Capital City to Cybersecurity Hub: Sacramento’s Digital Transformation Sacramento, California’s capital city, has been steadily evolving into a significant tech center with a growing focus on cybersecurity. Known for its rich history and government presence, Sacramento is now emerging as a dynamic tech ecosystem, showcasing its adaptability and innovative spirit. The sacramento pentest initiative…

  • Boston Penetration Testing

    As cyber threats continue to evolve and become more sophisticated, the city of Boston has recognized the need to enhance its cybersecurity measures. In response, Boston has launched the Boston Penetration Testing Initiative, a comprehensive program aimed at improving the cybersecurity posture of businesses and government entities across the city through rigorous penetration testing (pentesting)…