Cybersecurity analyst who reads CVEs before breakfast. Emma has spent 6 years building detection rules, responding to incidents, and explaining to management why patching matters.
The Bug That Refuses to Die In late 2023, the MOVEit Transfer breach hit roughly 2,600 organizations and exposed records belonging to over 90 million people. The root cause? A…
In March, a fintech client called us at 2 AM because an attacker had pulled 14GB of customer records from an S3 bucket that nobody on their team remembered creating.…
A manufacturing client called us on a Tuesday morning with a problem that didn’t add up. Their endpoint agent had flagged and quarantined a suspicious executable on three workstations. Good.…
Last quarter, we facilitated a tabletop exercise for a financial services client. Their CISO was confident the IR team could handle a ransomware scenario. Forty-five minutes in, three participants couldn’t…
During an incident response engagement last month, we traced a lateral movement chain (MITRE ATT&CK T1021.001) across a client’s hybrid environment—Azure VMs, on-prem file servers, and a forgotten AWS instance.…
A Missed Event Log Cost a Client Their Domain Admin Last year, a mid-size logistics company we manage came to us after discovering that a domain admin account had been…
A Base64 String Is Not a Security Strategy Last year we were brought in to assess a mid-sized fintech company’s Kubernetes environment after a failed compliance audit. Their security team…
A Backdoor Hiding in Plain Sight During a quarterly security review for a client running a 200-seat Windows environment, we found a DLL registered under HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Appinit_Dlls that had been…
A Plaintext Password That Cost a Client $200K Last year we inherited a managed environment from another vendor—a mid-size logistics company running 40+ scheduled PowerShell scripts across their domain controllers…
When Unencrypted East-West Traffic Becomes the Attacker’s Highway We were brought in after a healthcare provider’s internal audit flagged something alarming: a credential-harvesting tool had been sitting quietly on a…