Representative Foreword

After the Code, the Structure Remains

The representative foreword of this blog: security now fails less at finding issues than at absorbing, sustaining, and acting on what has already been found.

This essay frames the entire site first. The posts on technical analysis, method, and governance all start from this same problem statement.

After the Code, the Structure Remains

Detection, Method, Governance

🔥 A Mind That Dissects Systems

🔥 Trust and Culture Beyond Technology

🔥 Code That Fixes, Not Just Runs

Amadey Malware: A Comparative Study of Static Detection vs Memory-Based Detection

Comparing static vs memory-based malware detection using Amadey, showing why runtime YARA rules outperform file-hash approaches.

January 7, 2026 · 11 min · 2310 words

The Visibility Principle: How Internal Vulnerability Visibility Shapes Remediation Behavior

How transparent internal vulnerability visibility drives remediation through accountability and deterrence without formal punishment.

December 29, 2025 · 6 min · 1080 words

Attack Surface Management in 2025: Why Continuous Visibility is Essential

Why continuous attack surface management is critical in 2025, covering AI-driven discovery, shadow IT, and zero trust integration.

December 22, 2025 · 11 min · 2330 words

The Gap Between CISO Strategy and Execution: The WAF Debate and Field Leadership Report

A comprehensive report presenting a roadmap for practical security improvement and field leadership, centered around the debate on WAF and the gap between philosophy and execution.

June 30, 2025 · 13 min · 2756 words

The Limitations of 'Secure' SSRF Patches: Advanced Bypasses and Defense-in-Depth

A deep dive into why common SSRF defense code is often incomplete, real-world bypasses, and practical, layered mitigation strategies for developers and security engineers.

June 25, 2025 · 20 min · 4260 words

Exception Serialization Patterns in OpenStack Nova: Theoretical RCE Risks and Lessons Learned

Theoretical RCE risks in OpenStack Nova’s exception serialization via oslo.messaging, with PoC scenarios and defense patterns.

June 10, 2025 · 8 min · 1615 words

Endpoint Security Evasion (2020–2025): From EDR Bypass to EDR Kill

A technical analysis of how BYOI, BYOVD, DLL hijacking, and service abuse shifted endpoint attacks from EDR bypass to EDR kill between 2020 and 2025.

May 28, 2025 · 33 min · 6841 words

SPOF in Cybersecurity: From History to Strategy, a Graph-Based Analysis

Graph-based analysis of Single Points of Failure in cybersecurity, using weighted path enumeration to identify critical infrastructure nodes.

May 15, 2025 · 5 min · 1018 words

Dicer Module Vulnerability Mitigation Guide: CVE-2022-24434

Mitigation guide for CVE-2022-24434 in the Dicer module affecting Multer and Express, with practical dependency chain fixes.

May 12, 2025 · 2 min · 343 words

How I Managed Unmaintained Open Source with Gmail and Snyk Alerts

Automating Snyk vulnerability alert management with Google Apps Script and Gmail when official API access falls short.

May 12, 2025 · 5 min · 1049 words