by Arjun Shailly | Jan 26, 2026 | Deep Dive
From IPs to People Find Threat Talks on From IPs to PeopleDetection only works when activity is tied to identity. Most networks still enforce access and investigate incidents using IP addresses. But IPs don’t explain intent.They don’t travel with the user.And they...
by Arjun Shailly | Jan 12, 2026 | Deep Dive
Maritime Cybersecurity: Predictable = Hackable Find Threat Talks on Maritime Cybersecurity: Predictable = Hackable Autonomous shipping is supposed to make the ocean safer by removing human error. Instead, predictability is turning vessels into steerable systems,...
by Arjun Shailly | Dec 30, 2025 | Deep Dive
Looking Back at 2025 Find Threat Talks on Looking Back at 2025: Cybersecurity at a Turning Point Detection didn’t fail in 2025.It reached its limits – and many teams only realized it after the fact. The threat landscape didn’t suddenly become more...
by Arjun Shailly | Dec 19, 2025 | Deep Dive
BGP Vortex: Internet Kill Switch? Find Threat Talks on BGP Vortex: Internet Kill Switch? BGP is designed to keep the internet connected by constantly recalculating routes between networks. BGP Vortex flips that strength into a weakness. Instead of hijacking traffic or...
by Arjun Shailly | Dec 16, 2025 | Deep Dive
WSUS RCE: Update Weaponized Find Threat Talks on WSUS RCE: Update Weaponized Microsoft’s Windows Server Update Services (WSUS) is supposed to harden your environment by centralizing patching. Instead, a single flaw turned it into one of the cleanest...
by Arjun Shailly | Dec 9, 2025 | Deep Dive
Bad Successor: The Service Account Flaw to Watch Find Threat Talks on Bad Successor: The Service Account Flaw to Watch Windows Server 2025 introduced DMSA – a “secure by design” upgrade meant to modernize service accounts.Instead, it opened one of the cleanest...