Blog Show All6 Cybersecurity Policy & Ethics3 Observations on Cyber Threat Intelligence1 Observations on Threat Intelligence2 Research Process1 Vulnerability Disclosure3 2025 Jun 23Turla’s Pelmeni Wrapper: How Weak Crypto Exposed Kazuar’s Payload Jun 14Scanning Beyond the Patch: A Public-Interest Hunt for Hidden Shells May 30Ready, Retain, Fire? The Quiet Fallout of U.S. Offensive Cyber Policy May 24What You Hide Will Hurt You: The Streisand Effect of Zero-Day Vulnerabilities May 17The Ransomware Blame Game: Who Bears the Burden of Sanction Enforcement? May 10Unsolicited but Ethical: Threshold Deontology in Public Interest Vulnerability Disclosure