May '26 Project Glasswing: Who Gets to Hold Mythos, and Why It Matters
Anthropic gated Mythos to twelve partners. The decision behavior signals industrial unilateralism — what it means for builders and attackers in the gated era.
ai-securityglasswinganthropicgovernanceindustrial-unilateralism
Article Apr '26 Part 2: nmap dissected — don't blow your cover before you've even started
Going beneath the hood: how nmap actually discovers hosts, what changes across subnet boundaries, and why the default 'stealth' flags aren't as stealthy as they sound.
nmaptcp-iparpoffensive-securitywire-level
Article Apr '26 Part 1: nmap — why it's everyone's first scan
Almost every engagement starts the same way: an nmap scan. Here's what nmap actually does, why everyone runs it first, and where depth and stealth start pulling in opposite directions.
nmapreconoffensive-securitypentest
Article Mar '26 I Updated My LinkedIn. Two Days Later, Someone Impersonated My CEO.
It's been one month since I joined Cymetrics, and I don't think I'll forget how warm those first few weeks were — or the phishing email that arrived two days after I updated my LinkedIn.
phishingosintsocial-engineeringlinkedin
Article Feb '26 Cybersecurity, Scammers, and Confidence
Guest on 她Ta Zhi Dao — how scammers collect your data, social engineering in Asia, and building confidence as a woman in security.
social-engineeringpodcast
Podcast May '25 Serendipity in Giving
Volunteering at the Women in Tech Global Summit 2025 in Osaka — how showing up and giving fully turns serendipity into something tangible.
personalvolunteeringcommunity
Medium '25 My First On-Chain Hacking: Fallback
Solving Ethernaut's Fallback challenge — claiming contract ownership and draining funds by exploiting how Solidity handles fallback functions.
ethernautweb3solidity
Article