Blog Show All10 Cybersecurity Policy & Ethics4 Observations on Cyber Threat Intelligence1 Observations on Threat Intelligence5 Research Progress4 Vulnerability Disclosure4 2026 Apr 29Handled, Not Hosted: Administrative Activity Inside a Bulletproof Hoster Jan 14After the Takedown: Excavating Abuse Infrastructure with DNS Sinkholes 2025 Nov 24The Anatomy of a Bulletproof Hoster: A Data-Driven Reconstruction of Media Land Oct 28Virtue Before Permission: The Ethical Character of Vulnerability Disclosure Jun 23Turla’s Pelmeni Wrapper: How Weak Crypto Exposed Kazuar’s Payload Jun 14Scanning Beyond the Patch: A Public-Interest Hunt for Hidden Shells May 30Ready, Retain, Fire? The Quiet Fallout of U.S. Offensive Cyber Policy May 24What You Hide Will Hurt You: The Streisand Effect of Zero-Day Vulnerabilities May 17The Ransomware Blame Game: Who Bears the Burden of Sanction Enforcement? May 10Unsolicited but Ethical: Threshold Deontology in Public Interest Vulnerability Disclosure