🔥 A Mind That Dissects Systems

🔥 Trust and Culture Beyond Technology

🔥 Code That Fixes, Not Just Runs

Exception Serialization Patterns in OpenStack Nova: Theoretical RCE Risks and Lessons Learned

Analysis of potential Remote Code Execution vulnerability in OpenStack Nova’s exception serialization mechanism, including multiple PoC scenarios and defense recommendations.

June 10, 2025 · 8 min · 1615 words

Endpoint Evasion Techniques (2020–2025): The Evolution of Attacks Bypassing EDR

This post analyzes the evolution of endpoint evasion techniques from 2020 to 2025. It covers BYOI, BYOVD, DLL hijacking, service tampering, and other sophisticated methods attackers use to bypass EDR and AV. Real-world ransomware cases and vendor impact are discussed, along with defensive insights.

May 28, 2025 · 33 min · 6903 words

SPOF in Cybersecurity: From History to Strategy, a Graph-Based Analysis

Analyzing the threat of Single Points of Failure (SPOF) through historical examples and graph theory, this piece presents a strategic approach to identifying and mitigating structural weaknesses in cybersecurity infrastructures.

May 15, 2025 · 5 min · 1018 words

Dicer Module Vulnerability Mitigation Guide: CVE-2022-24434

This guide analyzes a vulnerability in the Dicer module indirectly affecting Multer, and provides a practical mitigation strategy. It serves as a real-world example of dealing with unmaintained open source dependencies.

May 12, 2025 · 2 min · 343 words

How I Managed Unmaintained Open Source with Gmail and Snyk Alerts

When API access falls short, automation through Gmail and Apps Script becomes essential. Here’s how I used Google Apps Script to collect Snyk vulnerability alerts and patch data automatically.

May 12, 2025 · 5 min · 1049 words

Human Insight and Artificial Intelligence: Dialogue at an Impossible Crossroads

Can AI achieve enlightenment? This article explores the asymmetric nature of human insight and machine repetition, outlining technical conditions that might allow for a reflective AI—and the philosophical limits it must face.

May 7, 2025 · 5 min · 981 words

Detection Frameworks and Latest Methodologies for eBPF-Based Backdoors

This article analyzes the rise of backdoors and rootkits exploiting eBPF, the detection challenges they pose, and comprehensively summarizes the latest countermeasures and research trends (2023–2025), including Tracee, LKRG, bpftool, and hypervisor-based auditing.

April 28, 2025 · 14 min · 2960 words

In-Depth Report on Telecommunication Security: SKT Breach and Global Case Studies

An in-depth analysis focusing on the 2025 SKT breach, the core security structures of telecom infrastructure, and historical global incidents (Gemalto, APT10, Circles). Also covers subscriber authentication (Ki, SUPI/SUCI) and security differences between 5G SA and NSA.

April 28, 2025 · 5 min · 864 words

CVE-2019-17570 Apache XML-RPC Vulnerability Analysis Report

A detailed analysis of the CVE-2019-17570 deserialization vulnerability in the Apache XML-RPC library, including patching methods and secure implementation practices.

April 24, 2025 · 2 min · 360 words

Is Your Data in the Cat's Paws?

The 2025 KakaoPay case exposed the limits of formal consent and self-regulation. Data democracy must be achieved through AI-based DPIA verification and civic oversight.

April 21, 2025 · 6 min · 1156 words