What Critical Infrastructure Teaches Us About Enduring OSINT Capability

When things go right in critical infrastructure, nothing happens. The lights stay on, planes fly, and ports stay open. Critical infrastructure is more important than ever to Australia , and increasingly its stability depends on the unseen work of open-source intelligence (OSINT), which helps organisations detect emerging threats and act before they escalate. Australian OSINT … Read more

Our Security Scanner Was the Hacker. I Spent Last Week Cleaning Up.

Photo by Vikram Singh on Unsplash CYBERSECURITY · AI · SUPPLY CHAIN This week, the tools your teams use to build and secure AI pipelines were weaponised against you. I know — I spent last week rotating secrets because of it. Last week I spent three days helping my teams rotate secrets. Not because we were breached. Not because an attacker … Read more

WMI Event Consumer Persistence: How APT29 Achieves Fileless Persistence (Part 1)

Understanding the theory before analyzing real attack logs I’m learning about WMI persistence. This is not research. This is me documenting what I found while studying a technique that APT29 and 20+ other APT groups use. Part 2 will be different — actual lab testing, real Sysmon logs, detection methodology. This is just my notes. Why I’m Studying This I kept … Read more

RaaS Business Plan: Ransomware Unit Economics 2026

Ransomware revenue was roughly $820 million in on-chain payments last year, according to Chainalysis. Down from the $1.25 billion record in 2023, but still one of the more reliable criminal revenue streams on the planet. Eighty-five extortion groups competed for that market in Q3 2025, per Checkpoint. Forty-seven of them claimed fewer than ten victims each. That … Read more

Real Investigation:- How We Traced Google Cloud IP Recon Activity

It Didn’t Look Dangerous at First Every SOC analyst knows this feeling.You’re watching dashboards.Logs are flowing.Nothing critical. Nothing red.Then you notice one IP address.It’s not triggering a high-severity alert.It’s not exploiting anything.It’s just persistent.50–100 requests per second.Not a spike.Sustained.That’s when instinct kicks in. Introduction:- When “Google LLC” Doesn’t Mean Safe In security operations, not every investigation starts with … Read more

❤️ Help Fight Human Trafficking
Support Larry Cameron's mission — 20,000+ victims rescued