#ai#agents#startupsOn building an AI-native company28 April 2026Two weeks ago I was about to hire an EA and sign three SaaS contracts. I haven't done either.Read more
#devsecops#ai#crowdstrikeBuilding CrowdStrike workflows with Claude Code skills17 February 2025Building CrowdStrike Falcon Fusion workflows with Claude Skills. What if you could just describe your security workflows?Read more
#devsecopsKeep it secret. Keep it ... safe?8 February 2021What happens after you accidentally leak secrets to a public code repository.Read more
#osint#passlo#passwordsAnalysing over 1M leaked passwords from the UK's biggest companies21 May 2020This article was originally published via the Passlo blog, my SaaS startup. How do some of the UK’s biggest companies fair when it comes to passwords? Does…Read more
#toolkit#devsecopsAhh shhgit!17 October 2019DevSecOps — the art of embedding security into the software development lifecycle — is a common and largely underestimated threat vector for many organisations…Read more
#passwords#toolkitEffortless password audits1 November 2018Passwords. They are the keys to our digital kingdoms. And these days most organisations will have security controls in place, such as 2 Factor Authentication…Read more
#researchMining Mimecast: brute forcing your way to success15 March 2018This article was originally published via the Schillings cyber blog, where I previously worked. Mimecast is one of the largest cloud e-mail security providers…Read more
#research#osintOnline stalking: London, Paris, New York13 February 2018Citymapper is a journey planning application that integrates all modes of transport (public, cycling, walking, driving) in major urban areas. Starting in London…Read more
#researchDomino's: pizza and payments4 April 2016Friday evening, circa 3 years ago. I’m craving an Americano with extra pineapple and hot dog stuffed crust. I fire up the Domino’s Android app, place my order…Read more
#research#iotOwning Philips In.Sight IP cameras30 January 2015This is a continuation from my previous post but this time we’ll be taking a look at the device itself, the Philips In.Sight M100. The end goal is to pop a root…Read more
#researchYoics: account takeover vulnerability29 January 2015Yoics market themselves as “secure cloud networking” and is a service that allows you to “Internet access (almost) anything”. Many top brands use Yoics services…Read more
#researchMoonpig vulnerability4 January 2015Moonpig are one of the most well known companies that sell personalised greeting cards in the UK. In 2007 they had a 90% market share and shipped nearly…Read more
#researchNational Express ticket takeover23 September 2014National Express are one of the biggest public transport companies in the UK with a huge fleet of coaches and trains. This vulnerability discloses customers…Read more
#researchCerberus anti-theft Android device takeover vulnerability19 December 2013You may or may not have heard of Cerberus, an anti-theft application for Android devices. Cerberus allows you to remotely control your device if it has been…Read more
#researchFunky Pigeon account take over24 October 2013If you have an account with FunkyPigeon.com then you should be extremely concerned. It is possible for an attacker to gain access to your account which can…Read more