AIVenture CapitalPhishingThe Phish from WithinThe AI-powered anti-phishing ploy; the most elaborate phishing operation in corporate history - targeting VC portfolios instead of users.Sma Das·Tuesday, January 20, 2026
certificationscybersecuritycareerCertified in Confusion²Certifications are expensive and promise you the moon; but only their costs can reach the moon.Sma Das·Sunday, January 18, 2026
cybersecuritymalwareresearchThe Stealer Log Ecosystem: Processing Millions of Credentials a DayAn in-depth analysis of the evolving stealer malware ecosystem, from Telegram channels to credential marketplaces, and how organizations can protect themselves.Sma Das·Thursday, January 15, 2026
cybersecurityinfrastructureprogrammingBuilding a Production Honeypot Network: Lessons from the FieldHow we designed and deployed a distributed honeypot network that captures real-world attack data, from architecture decisions to operational insights.Sma Das·Monday, January 5, 2026