Blog
Knowledge
Transmitted
Insights on cyber attacks, network engineering, web security, and SIEM operations.

CybersecurityFeatured
Inside Modern Ransomware: How Attackers Encrypt and Exfiltrate
A deep dive into the anatomy of a ransomware attack — from initial access to double extortion, with real-world case studies and detection strategies.
#Ransomware#Malware#SIEM
Feb 15, 2026·8 min read
Networking
VLAN Segmentation: The First Line of Network Defence
Why network segmentation is non-negotiable in modern enterprise environments, with a practical Cisco Packet Tracer walkthrough.
6 min readJan 28, 2026

Web Security
API Fuzzing with SpecSnipe: Finding What Developers Miss
How I built SpecSnipe to automate OpenAPI vulnerability discovery — the methodology, the findings, and what it means for API security testing.
10 min readJan 10, 2026

SIEM
Building Effective SIEM Detection Rules for Insider Threats
Practical guide to crafting correlation rules that catch subtle insider threat patterns without drowning analysts in false positives.
7 min readDec 18, 2025