VOL.01 · ISSUE №0 — a security engineer's obsession with the why and the how —
FEATURED

Ghosts
on the
wire.

How a four-person IR team unraveled a year-long compromise hiding inside legitimate backup traffic — and the playbook every defender should steal.

# dwell-time analysis
$ grep -E "BackupSvc.*POST" access.log
...368 days of legitimate-looking writes
found: 1 anomaly
## ~/posts $ ls -lt

The feed

First post coming soon.