🔥 A Mind That Dissects Systems

🔥 Trust and Culture Beyond Technology

🔥 Code That Fixes, Not Just Runs

Why Account Takeover Never Ends — Dismantling the ATO Supply Chain

How Korea’s CaaS supply chain reproduces itself through the recycling loop of points, gift cards, and crypto — and why defending against it requires reading the entire behavioral network, not just the login page.

April 7, 2026 · 5 min · 1038 words

Structure Builders Will Outlast Vulnerability Finders

18 years of vulnerability hunting distilled into one insight: the shift from individual instinct to scalable structure — and what AI means for those left standing.

April 2, 2026 · 8 min · 1590 words

The CAPTCHA That Became a Free Automatic Door for Hackers — A Bypass PoC and Defense Strategy

A practical look at an audio CAPTCHA bypass PoC built with Playwright, Whisper, and Page-Agent, plus the login defenses that still matter after CAPTCHA falls.

March 30, 2026 · 28 min · 5799 words

WAF/IPS/IDS Detection Gap Analysis and Remediation Direction

Structural analysis of WAF, IPS, and IDS detection gaps from parsing discrepancies, with a practical remediation taxonomy.

March 13, 2026 · 45 min · 9553 words

The Gap Between CISO Strategy and Execution: The WAF Debate and Field Leadership Report

A comprehensive report presenting a roadmap for practical security improvement and field leadership, centered around the debate on WAF and the gap between philosophy and execution.

June 30, 2025 · 13 min · 2756 words

Endpoint Evasion Techniques (2020–2025): The Evolution of Attacks Bypassing EDR

Five years of EDR evasion techniques—BYOI, BYOVD, DLL hijacking, and service tampering—with real ransomware case studies.

May 28, 2025 · 33 min · 6903 words

SPOF in Cybersecurity: From History to Strategy, a Graph-Based Analysis

Graph-based analysis of Single Points of Failure in cybersecurity, using weighted path enumeration to identify critical infrastructure nodes.

May 15, 2025 · 5 min · 1018 words

Detection Frameworks and Latest Methodologies for eBPF-Based Backdoors

How eBPF-based backdoors evade traditional detection, and modern frameworks like Tracee and LKRG that counter kernel-level threats.

April 28, 2025 · 14 min · 2960 words

In-Depth Report on Telecommunication Security: SKT Breach and Global Case Studies

In-depth analysis of the 2025 SKT breach, telecom authentication mechanisms, and 5G SA vs NSA security architecture differences.

April 28, 2025 · 5 min · 864 words