<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cyberwox Unplugged]]></title><description><![CDATA[Insights into cybersecurity engineering, complemented by real-life anecdotes on building a fulfilling career.]]></description><link>https://www.cyberwoxunplugged.com</link><image><url>https://substackcdn.com/image/fetch/$s_!pA5b!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png</url><title>Cyberwox Unplugged</title><link>https://www.cyberwoxunplugged.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 19 May 2026 03:00:43 GMT</lastBuildDate><atom:link href="https://www.cyberwoxunplugged.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Dayspring Johnson]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyberwox@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyberwox@substack.com]]></itunes:email><itunes:name><![CDATA[Day Johnson]]></itunes:name></itunes:owner><itunes:author><![CDATA[Day Johnson]]></itunes:author><googleplay:owner><![CDATA[cyberwox@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyberwox@substack.com]]></googleplay:email><googleplay:author><![CDATA[Day Johnson]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Are Humans Really the Weakest Link?]]></title><description><![CDATA[My attempt at dispelling this notorious rhetoric, and an introduction to human-centered security.]]></description><link>https://www.cyberwoxunplugged.com/p/are-humans-really-the-weakest-link</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/are-humans-really-the-weakest-link</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 24 Apr 2026 12:03:49 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/25e150d6-b897-4fee-a56d-c50d823a50d9_1728x910.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For as long as cybersecurity has existed, we&#8217;ve repeated one line like gospel:</p><blockquote><p><strong>&#8220;Humans are the weakest link.&#8221;</strong></p></blockquote><p>We&#8217;ve even made cybersecurity <a href="https://www.alertlogic.com/blog/why-humans-weakest-link-cybersecurity/">marketing</a> and product playbooks just to fit this rhetoric.</p><p>It&#8217;s said with a mix of conviction, some frustration, and resignation, as if the problem begins and ends with the user who clicked the phishing email or reused their password.</p><p>But lately, I&#8217;ve been rethinking that phrase, because maybe the problem isn&#8217;t the people.</p><p>Maybe it&#8217;s the way we design for them.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 7000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like reading, fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1><strong>A Flawed Premise</strong></h1><p>I&#8217;ve been reading (and have since paused) Don Norman&#8217;s <strong>The Design of Everyday Things</strong>. This is one of the most influential books on human-centered design.</p><p>Norman shares a story about investigating the <a href="https://en.wikipedia.org/wiki/Three_Mile_Island_accident">Three Mile Island nuclear accident</a>. The operators were blamed for &#8220;human error,&#8221; but as his committee later found, the real failure was design.</p><p>The control panels were so poorly laid out that it was inevitable that the wrong actions would be taken.</p><p>That story struck me hard because the same logic applies to cybersecurity. Hence, the reason why I&#8217;m writing this.</p><p>When we blame users for being &#8220;the weakest link,&#8221; what we&#8217;re really saying is: </p><blockquote><p><strong>We designed a system that expected humans to behave perfectly&#8230;and they didn&#8217;t.</strong></p></blockquote><div><hr></div><h1><strong>What Human-Centered Design Teaches Us</strong></h1><p>Norman&#8217;s philosophy is simple yet radical:</p><div class="pullquote"><p><strong>&#8220;It is the duty of machines and those who design them to understand people. It is not our duty to understand the arbitrary, meaningless dictates of machines.&#8221;</strong></p></div><p>Human-centered design starts from <strong>understanding humans</strong>.</p><p>It&#8217;s the belief that systems should be built around people, their capabilities, limitations, and behavior, not the other way around.</p><p>Now imagine applying that same principle to cybersecurity.</p><p>What if security were an <strong>enabler</strong> of trust, confidence, and resilience?</p><div><hr></div><h1>The Essence of Security</h1><p>I&#8217;ve been obsessed with word etymology recently and decided to find out the etymology of the word &#8220;security&#8221;.</p><p>Per <a href="https://www.etymonline.com/word/security">etymonline</a> (as recommended by Gemini), the word "security" originates from the Latin <em><strong>s&#275;c&#363;rit&#257;s</strong></em>, meaning <strong>freedom from care,</strong> apprehension, or danger, derived from <em><strong>s&#275;c&#363;rus</strong></em> ("safe" or "without care"). </p><p>It combines <em>se-</em> (without) and <em>cura</em> (care/concern), emerging into Middle English as <em>securite</em> in the early 15th century to describe a state of safety.</p><p>So, what this means is that security, at its core, is supposed to mean freedom from care. Freedom from anxiety. A state where you&#8217;re not constantly thinking about what could go wrong.</p><p>But that&#8217;s not what most people experience.</p><p>What they experience is friction. They experience getting locked out of their own accounts. They experience clicking through prompts they don&#8217;t fully understand. They experience being told to &#8220;be more careful&#8221; in systems that never really help them be.</p><p>Somewhere along the way, security stopped feeling like safety and started feeling like responsibility. And we handed that responsibility to the user.</p><p>That&#8217;s the part I keep coming back to, but that&#8217;s a letter for another day.</p><p><strong>What would it look like if we actually took that definition of security seriously?</strong></p><div><hr></div><h1><strong>Human-Centered Security</strong></h1><p>If security is supposed to feel like freedom from care, then what we build shouldn&#8217;t feel like something users have to constantly fight through. It should feel like something that quietly supports them.</p><p>That&#8217;s where I think human-centered security comes in.</p><p>Human-centered security, at least to me, isn&#8217;t about adding more shiny controls or features. It&#8217;s about rethinking security as an experience.</p><p>Reality shows that a well-designed system doesn&#8217;t rely on people memorizing policies or sitting through another awareness training session. It makes the right action obvious through its design. The experience aligns with what security is actually supposed to feel like: a sense of safety, not constant friction.</p><p>That distinction&nbsp;<strong>matters</strong>&nbsp;because if we over-index on the&nbsp;<em><strong>feeling</strong></em>&nbsp;of security without grounding it in reality, we end up with something worse than insecurity, a false sense of security.</p><p>And we know how dangerous that can be.</p><p>The better approach is simpler, but harder to execute. It&#8217;s the same principle you see everywhere else in good design, where you don&#8217;t need a manual to use a well-designed door. You don&#8217;t need a checklist to move through a clean interface. The design communicates intent. It guides behavior and meets you where you are.</p><p>Security should be doing the same thing.</p><p>Which means the questions start to change.</p><p>Not &#8220;how do we make users comply,&#8221; but how do users naturally understand what&#8217;s secure? How do we communicate risk in a way that actually lands, without overwhelming them? <strong>How do we make the secure choice the path of least resistance instead of the most difficult one</strong>? And how do we make security feel like an enabler instead of something that&#8217;s constantly in the way?</p><p>These questions are important because the reality is, people are going to make mistakes. That&#8217;s not a flaw in the system. That <em>is</em> the system.</p><p>Good design anticipates that. It doesn&#8217;t pretend it won&#8217;t happen. It builds around it.</p><p>In a security context, that means assuming an error will occur and designing for it anyway. It means putting guardrails in place that prevent small mistakes from turning into major incidents. It means creating feedback loops that actually teach and guide rather than punish people after the fact.</p><p>Once you start thinking about it this way, the &#8220;weakest link&#8221; framing starts to fall apart.</p><p>We start to undo this quiet assumption that&#8217;s shaped security for years. This bad assumption that the relationship between humans and security has to be adversarial, or that the user is the problem to be controlled.</p><p>It doesn&#8217;t have to be that way.</p><p>When you design with people in mind, the relationship shifts and becomes collaborative. The system supports the human, and in turn, the human strengthens the system.</p><div><hr></div><h1><strong>The Real Weak Link</strong></h1><p>Every incident I&#8217;ve ever investigated has reinforced a humbling truth:</p><blockquote><p>The system&nbsp;<strong>always</strong>&nbsp;works exactly as designed; it was just used for a different purpose or via a different mechanism than intended.</p></blockquote><p>This is the part we tend to move past too quickly because, when you really sit with it, much of what we label &#8220;human failure&#8221; doesn&#8217;t actually start with the human. It starts with the environment we placed them in.</p><p>If a developer can&#8217;t realistically follow an IAM policy because it&#8217;s too complex to reason about in the flow of their work, that&#8217;s not a training gap. If a phishing simulation leaves employees feeling embarrassed instead of better equipped the next time around, that&#8217;s not awareness. If a password rotation policy leads to credentials being written down and hidden under keyboards, that&#8217;s not defiance.</p><p>Those are signals.</p><p>Signals that the system, as designed, is asking people to operate in ways that don&#8217;t align with how they actually <strong>think</strong>, <strong>work</strong>, and <strong>make decisions.</strong></p><p>And this is where I think security always loses the plot.</p><p>We&#8217;ve spent years optimizing for technical correctness, tighter controls, more coverage, and logical completeness. But in doing so, we&#8217;ve overlooked something, the fundamental fact that humans don&#8217;t operate on logic alone.</p><p>They operate on trust, intuition, emotion, and habit.</p><p>And when those realities collide with systems that weren&#8217;t designed with them in mind, something has to give.</p><p>Most of the time, it&#8217;s the human who gets blamed.</p><p><strong>But if we&#8217;re being honest, the system did exactly what it was built to do.</strong></p><p>And until security starts accounting for that, we&#8217;ll keep building mechanisms that look strong on paper but end up working against the very people they&#8217;re supposed to protect.</p><div><hr></div><h1>AI, for humanity?</h1><p>I believe this is where AI starts to become interesting and useful in a very different way. Not just as a tool for detection or automation, but as a bridge between systems and people.</p><p>For the first time, we have systems that can adapt more closely to how humans think, rather than forcing humans to adapt to rigid machine logic.</p><p>And if that&#8217;s the direction things are moving, then the role of the security professional has to evolve with it.</p><p>It&#8217;s no longer enough to just understand systems. You have to understand people, their thought processes, how they make decisions, and how trust is formed and broken. The Social Engineering Community already has a head start on this.</p><p>As AI continues to accelerate the technical side of security, more of the differentiation will come from understanding the human side. Psychology, behavior, communication, and all areas that security has historically treated as secondary will become core to how effective systems are designed.</p><div><hr></div><h1><strong>Rethinking Security Through Human-Centered Design</strong></h1><p>Human-centered design doesn&#8217;t excuse mistakes or assign blame to humans; it approaches design with them in mind.</p><p>It utilizes iteration, observation, and empathy to design systems that adapt to human behavior, rather than requiring humans to adapt to systems.</p><p>So maybe the next evolution of cybersecurity isn&#8217;t just about AI-driven detections or zero-trust architectures.</p><p>Perhaps it&#8217;s also about human-centered security, which builds systems designed to work with people, not against them.</p><blockquote><p>The real weakest link isn&#8217;t the human. It&#8217;s our failure to design for humans.</p></blockquote><div><hr></div><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/are-humans-really-the-weakest-link?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/are-humans-really-the-weakest-link?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Engineering Career Lessons You Won’t Get in Certification Courses]]></title><description><![CDATA[Lessons in Security Engineering from Jason Chan&#8217;s High-Velocity Framework (and My Own Battles in the Field).]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-engineering-career</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-engineering-career</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 21 Nov 2025 14:49:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d1ad9f07-e5c4-453e-ac28-ae20d91e521f_1440x810.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few months ago, I read <a href="https://www.linkedin.com/in/jasonbchan/">Jason Chan&#8217;s</a> feature in the TL;DR sec newsletter titled&nbsp;<em><a href="https://tldrsec.com/p/security-for-high-velocity-engineering">"Security for High-Velocity Engineering</a></em>." If you&#8217;ve ever built security tooling or led engineering efforts under pressure, the piece might feel less like a framework and more like a mirror. </p><p>It&#8217;s a strategic blueprint from someone who helped Netflix scale security without slowing the company&#8217;s engineering engine&#8212;a balance that&#8217;s notoriously hard to get right.</p><p>It got me thinking about my own path as a Security Engineer and the various domains I&#8217;ve worked in. </p><p>What stuck with me wasn&#8217;t just Jason&#8217;s structured layers of <strong>context, strategy, and execution</strong>, but how those principles have shown up in my work again and again.</p><p>Sometimes explicitly. Sometimes, without realizing it until later.</p><p>So in this issue, I want to do two things:</p><ol><li><p>Walk you through a few pivotal moments in my security engineering career</p></li><li><p>Extract real, applicable lessons from each so that you can bring them into your own context</p></li></ol><p>This is not just &#8220;what I did.&#8221;</p><p> It&#8217;s &#8220;why it mattered, and what it could mean for you.&#8221;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 7,000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><p>Watch the full video breakdown below:</p><div id="youtube2-HlGuOdY7Y2I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;HlGuOdY7Y2I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/HlGuOdY7Y2I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1><strong>When Speed Is the Priority</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jADY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jADY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jADY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jADY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jADY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jADY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1559843,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/179558051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jADY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jADY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jADY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jADY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Jason discusses how security teams must make room for velocity, <em>not hinder it</em>. </p><p>That means knowing when to optimize for &#8220;good enough right now&#8221; versus &#8220;perfect later.&#8221;</p><p>That lesson hit me hard during an active cloud campaign while I was a cloud threat detection engineer. </p><p>We were watching an attacker group compromise cloud environments at scale, deploying crypto miners using consistent IAM roles and resource naming patterns.</p><p>We had <strong>clear indicators</strong>, but no time for elegant detection modeling or layered behavioral <strong>TTP-based detections</strong>.</p><p>So I made the call to build and deploy an <strong>IOC-heavy detection</strong>. </p><p>The logic was sharp but narrow. It was very atomic in nature. </p><p>Honestly, it wasn&#8217;t what I&#8217;d want to ship under normal conditions. But it bought us time. </p><p><em>Visibility first. Accuracy later.</em></p><p><strong>What I learned (and you can apply):</strong></p><ul><li><p>There is a time and place for precision, but don&#8217;t let the perfect detection delay critical visibility.</p></li><li><p>Your first iteration (for an atomic detection) doesn&#8217;t have to scale. It has to inform.</p></li><li><p>Build something quickly, but tag it for review. Revisit it once the fire&#8217;s out.</p></li><li><p>Sometimes, shipping quickly is <em>the</em> safest thing to do.</p></li></ul><p>And this applies far beyond cloud detection. </p><p>Whether it&#8217;s building IAM policies, hardening containers, or writing security automation, sometimes velocity is the first layer of resilience.</p><div><hr></div><h1><strong>Build Once, Scale Forever</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UYjK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UYjK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UYjK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/788120c3-af76-4e50-a315-801158f020c9_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1670405,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/179558051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UYjK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Jason describes &#8220;strategy&#8221; as choosing high-leverage work that scales your impact.</p><p>When I was tasked with building detections for Google Cloud (GCP) as a cloud threat detection engineer, I could have started cranking out detections service by service.</p><p>But I knew that wouldn&#8217;t scale, and frankly, I didn&#8217;t fully understand GCP yet. Instead, I stepped back and developed an understanding of the cloud provider and a <strong>cloud</strong> <strong>threat modeling framework</strong>.</p><p>I grouped GCP services into high-level domains - Compute, storage, IAM, databases, and then used those abstractions to understand attack surfaces.</p><p>From there, I could drill down into the specifics: </p><ul><li><p>What does identity misuse look like across IAM and storage? </p></li><li><p>How does lateral movement manifest in GCP&#8217;s managed services?</p></li><li><p>How are GCP services abused differently or similarly to other Cloud services?</p></li></ul><p><strong>What I learned (and you can apply):</strong></p><ul><li><p>Before building tooling or detections, have a mental model of the domain. It doesn&#8217;t have to be perfect&#8212;it just has to make complexity navigable.</p></li><li><p>Focus on identifying common patterns across services rather than isolated exceptions. This is where reliable detection logic starts.</p></li><li><p>If you&#8217;re onboarding into a new cloud provider, threat modeling isn&#8217;t a &#8220;nice to have&#8221;&#8212;it&#8217;s your best shot at building a reusable, scalable detection strategy.</p></li><li><p>Documentation is a weapon. When you build mental models, write them down. It&#8217;ll save the next person weeks of confusion&#8212;and save you from repeating work six months later.</p></li></ul><blockquote><p>If you&#8217;re early in your career, this is gold: <strong>don&#8217;t just solve the problem, try to solve the class of problems.</strong></p></blockquote><div><hr></div><h1><strong>Why Saying &#8220;No&#8221; is Strategic</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s2fk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s2fk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s2fk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3168081,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/179558051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s2fk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One of the sharpest lines from Jason&#8217;s piece comes from Netflix&#8217;s former CEO, Reed Hastings: </p><blockquote><p>&#8220;Strategy is about what you don&#8217;t do.&#8221;</p></blockquote><p>In my current role, I work on differentiated threat intelligence for specific business units. </p><p>One thing I&#8217;ve learned the hard way is that <strong>not all intel is valuable</strong>, even if it&#8217;s technically correct or urgent elsewhere.</p><p>The internet is full of noise: threat feeds, CVEs, indicators, and intel reports. But my responsibility is to ask, <em>&#8220;Is this relevant to us?&#8221;</em> If not, I let it go&#8212;even if it seems scary or hyped.</p><p><strong>What I learned (and you can apply):</strong></p><ul><li><p>Intelligence without context is just a distraction.</p></li><li><p>Learn to filter based on <em>business impact</em> and <em>sector alignment</em>, not just raw severity.</p></li><li><p>It&#8217;s okay to ignore the noise&#8212;especially if you&#8217;re building a detection or IR strategy. Not every problem is <strong>your</strong> problem.</p></li><li><p>Write down your priorities or &#8220;filter criteria.&#8221; That makes your decisions repeatable and teachable.</p></li></ul><p>This applies equally across the SecOps team: don&#8217;t get caught writing detections or chasing rabbit holes just because something trended on Twitter.</p><div><hr></div><h1><strong>Institutional Memory is Security Engineering&#8217;s Secret Weapon</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CAFu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CAFu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CAFu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3567317,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/179558051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CAFu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Chan stresses that true scalability requires building systems people can use long after you&#8217;re gone. </p><p>That lesson came alive for me recently.</p><p>There were two major internal systems my team was responsible for&#8212;critical to detection, response, and threat intelligence&#8212;but they were barely understood. </p><p>No central knowledge. No reusable playbooks.</p><p>So, I took it on: I studied the systems, documented their behaviors and <em>our </em>failure points in our interactions with them, hosted a team lunch-and-learn, and built an internal wiki that others could use.</p><p><strong>What I learned (and you can apply):</strong></p><ul><li><p>Documentation isn&#8217;t a chore&#8212;it&#8217;s a force multiplier.</p></li><li><p>If your knowledge lives only in your head, your impact dies when you take PTO.</p></li><li><p>Teach others how to operate what you&#8217;ve built. That&#8217;s when you know you&#8217;ve succeeded.</p></li><li><p>Institutional knowledge is a competitive advantage&#8212;don&#8217;t let it go to waste.</p></li></ul><p>If you&#8217;re early in your career, this is one of the fastest ways to stand out: </p><blockquote><p><strong>Be the person who makes the unclear clear.</strong></p></blockquote><div><hr></div><h1>Final Thoughts</h1><p>Jason Chan&#8217;s framework gave me words for things I was already doing&#8212;but it also challenged me to be more intentional about them. </p><p>His call to build guardrails, not gates&#8230; to prioritize reuse over heroics&#8230; to measure and iterate... all of it resonates more deeply the longer I&#8217;ve been in this space.</p><p>So here&#8217;s my version of his model in practice:</p><ul><li><p><strong>Context</strong>: Understand what your org <em>actually</em> needs, not what LinkedIn or Twitter&#8217;s yelling about.</p></li><li><p><strong>Strategy</strong>: Invest in models, processes, and documentation that outlive you.</p></li><li><p><strong>Execution</strong>: Move fast when needed&#8212;but reflect hard and revise often.</p></li><li><p><strong>Measurement</strong>: Let the data from real incidents teach you how to improve.</p></li></ul><p>If you&#8217;re a security engineer, a detection engineer, a threat hunter, or even just starting, this is your reminder that <em>speed and security don&#8217;t have to be enemies</em>. </p><p>They can be collaborators if you give them structure.</p><p>Keep building paved roads. </p><p>And when you do, leave signs behind for the next engineer.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-engineering-career?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/p/cybersecurity-engineering-career?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[The 5 Cybersecurity Engineer Archetypes (and Why You Should Know Yours)]]></title><description><![CDATA[whoami?]]></description><link>https://www.cyberwoxunplugged.com/p/the-5-cybersecurity-engineer-archetypes</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/the-5-cybersecurity-engineer-archetypes</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Sat, 15 Nov 2025 15:27:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f9a7bf81-50a6-4663-9db2-b051090cc3f7_1440x810.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every security engineer, regardless of experience level, eventually reaches a point where they pause and ask:</p><p><strong>What kind of engineer am I?</strong></p><p>Not just what tools you use. Not just what your current title says. </p><p>But how do you show up? </p><p>How do you solve problems? </p><p>How do you instinctively approach complexity?</p><p>I&#8217;ve seen this question (and its answer) surface over and over again in Slack threads during IRs, in 1:1s with mentees, in hallway conversations, in the quiet frustration of mid-career engineers trying to &#8220;level up&#8221; but not quite sure how.</p><p>And after half a decade in the field&#8212;from building threat detection pipelines at prominent startups to leading IR and threat detection at one of the largest tech companies on Earth&#8212;I&#8217;ve come to believe that most of us in security tend to move within a few core archetypes.</p><p>Not boxes. Not labels.</p><p><strong>Gravity wells.</strong></p><p>You may have blended skills, but there&#8217;s usually a center of mass&#8212;a force that pulls you toward a particular way of thinking, contributing, and growing. And once you can name that?</p><p>That&#8217;s when your career starts to gain direction.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 7000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><p>Watch the full video breakdown below:</p><div id="youtube2-qDCBAYDEjvo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;qDCBAYDEjvo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/qDCBAYDEjvo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Archetypes: A Language for How We Work</h1><p>Across every security team I&#8217;ve been on, I&#8217;ve seen five archetypes show up again and again. </p><p>These are less about job titles and more about your <em>operating posture</em>.</p><p>How you move through problems, what you prioritize, and what kind of work gives you energy.</p><h2>The Guardian</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wniw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wniw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!wniw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!wniw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!wniw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wniw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:&quot;Generated image&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!wniw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!wniw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!wniw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!wniw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You&#8217;re the shield. The one who jumps on high-severity alerts before anyone else blinks. </p><p>You see logs like other people see spreadsheets in patterns, stories, and subtle shifts. Your radar is constantly scanning for badness.</p><p>You live in detection pipelines, SOAR playbooks, and IR processes. </p><p>You bring signal out of noise. And when things are chaotic, you&#8217;re the one who restores order.</p><p><strong>Superpower</strong>: Translating alerts into action. Noise into signal. Chaos into clarity.</p><p><strong>Growth Edge</strong>: Learning to zoom out. Don&#8217;t just be good at building detection rules or IR workflows. Learn to ask why this detection matters to the business in the first place.</p><h2>The Architect</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q0Ow!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q0Ow!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:&quot;Generated image&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!q0Ow!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://www.cyberwoxunplugged.com/p/the-5-cybersecurity-engineer-archetypes">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Operational Cost of Cybersecurity]]></title><description><![CDATA[The Hidden Cost of optimizing for &#8220;More&#8221; instead of &#8220;Better&#8221;.]]></description><link>https://www.cyberwoxunplugged.com/p/the-operational-cost-of-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/the-operational-cost-of-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Thu, 06 Nov 2025 17:18:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!R7vL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In finance, operational expenses, or OpEx, is the money it takes to keep something running.</p><p>Most of the time, you don&#8217;t just buy an asset and walk away; you continue to pay to maintain it. Take an investment property, for example. You pay for staff, maintenance, utilities, and software to sustain operations.</p><p>Cybersecurity is no different.</p><p>Every new detection rule, workflow automation, or control we deploy carries its own <strong>operational expenditure</strong>. It requires continuous validation, clear documentation, and regular upkeep via updates or deprecations.</p><p>But more importantly, it consumes the scarcest resource in cybersecurity: skilled humans. There simply aren&#8217;t enough experienced security professionals to go around, and every new control competes for their limited time, focus, and expertise.</p><p>On the same note, building new things is great; as a matter of fact, I encourage all cybersecurity engineers to be builders. However, building is a capital expenditure (CapEx). It&#8217;s exciting, one-time, and easy to celebrate.</p><p>Maintaining what we build? That&#8217;s OpEx. It&#8217;s invisible, mundane, constant, but essential.</p><p>The more you build, the more <em>likely</em> you are to owe, especially if you cut corners. And like financial debt, it doesn&#8217;t disappear. It compounds. You&#8217;re borrowing time from your future self, and eventually, the bill comes due.</p><p>But enough doom and gloom. This issue isn&#8217;t meant for that. It simply expresses this sentient problem as it relates to cyber defense.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div class="pullquote"><p><strong>Disclaimer</strong></p><p>This post is not about actual financial budgets for running a cybersecurity team; instead, it&#8217;s a lengthy metaphor on the&nbsp;<em>operational cost of security decisions</em>. The unseen expenses we incur in time, attention, and energy every time we add a new detection, control, or process. It&#8217;s about how every rule, workflow, and automation has a &#8220;maintenance bill&#8221;.</p></div><h1><strong>Detection Engineering: Hidden Subscription Fees</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R7vL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R7vL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R7vL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2211544,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/178147231?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!R7vL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Writing a detection rule feels like a win. Even better when it catches an actual threat. You get the dopamine hit of adding coverage, expanding visibility, and contributing to your SOC&#8217;s &#8220;rule count.&#8221;</p><p>But every detection you create is a new &#8220;subscription&#8221;. More specifically, a line item on your cybersecurity operational budget.</p><p>The <strong>starting cost</strong> is the time spent building the detection and testing for precision. Then comes the <strong>forever tax</strong> of cycles spent triaging inevitable false positives. Then there are <strong>hidden fees</strong> in the form of headspace needed to document, tune, and maintain as adversaries shift or your environment evolves.</p><p>Over time, these costs may accumulate into what I call <strong>detection debt</strong>. This is the backlog of unmaintained rules and unreviewed alerts that quietly bleed efficiency from your Cybersecurity Operations function.</p><p>And like real debt, it then <strong>accrues interest</strong> if you don&#8217;t pay it down quickly or reel in your &#8220;spending&#8221; habits: more noise, more fatigue, more missed signals.</p><p>A future issue of the newsletter will address the topic of detection deprecation which may help keep your budget on track.</p><div><hr></div><h1><strong>Incident Response: Expensive Attention</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HOUI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HOUI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HOUI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2395490,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/178147231?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HOUI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Incident Response operates under high pressure, where time is capital in a very valuable currency.</p><p>And just as a company&#8217;s burn rate determines its financial health, your alert volume and false positive rate determine your cognitive health, especially for the engineers or analysts triaging or responding.</p><p>When <strong>everything</strong> triggers, nothing stands out. It&#8217;s just like <a href="https://www.storyarts.org/library/aesops/stories/boy.html">the boy who cried wolf</a>. When security alerts lose credibility through repetition, coupled with little <strong>detection accountability</strong>, the real threats get ignored.</p><p>Each noisy alert from your detection engineering &#8220;subscription fees&#8221;, misconfigured automation workflows, or irrelevant security escalation/investigation costs minutes, which compound into hours across the team.</p><p>Ultimately, the time (capital) spent, or otherwise wasted, in a security incident could be the difference between containment and compromise. This is where those hidden fees start charging interest and bleeding you even more of your most finite IR resource - time.</p><div><hr></div><h1><strong>GRC: The Cost of Compliance Theater</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U5Pt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U5Pt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2393817,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/178147231?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U5Pt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Governance, Risk, and Compliance (GRC) resides in the fine print of cyber defense, which is precisely where operational costs accumulate quietly. Every new framework, audit requirement, or control mapping is like adding another recurring bill.</p><p>At first, it looks harmless. One more spreadsheet, one more evidence collection task.</p><p>However, over time, these small costs accumulate into process debt, resulting in endless reviews, repetitive documentation, and reactive reporting loops.</p><p>Essentially, the result of GRC becoming a checklist rather than a compass. OpEx skyrockets without improving actual security outcomes. Policies become artifacts. Audits become rituals.</p><p>You end up paying to maintain a compliance theater instead of actual cyber resilience. Everyone loves a good show, but it should not come at the expense of actual <strong>security</strong>.</p><div><hr></div><h1><strong>Maturity</strong></h1><p>Just as financial maturity isn&#8217;t necessarily measured by how much you make but by how much you actually keep, Security maturity should not simply be measured solely by how much you deploy.</p><p>It should also measure how much you sustain without drowning in your own complexity.</p><p>And your cost model should account for both maintenance and development.</p><p>I don&#8217;t want to reduce operational cost to a mere financial metaphor; I&#8217;ll dare to say that it&#8217;s a mindset.</p><p>It forces you to ask:</p><ul><li><p>Can this &lt;insert control here&gt; survive without me?</p></li><li><p>Can this &lt;insert control here&gt; be maintained six months from now?</p></li><li><p>Can this &lt;insert control here&gt; adapt to changes in the environment?</p></li></ul><p>If the answer is no, it&#8217;s not ready for production &#8212; it&#8217;s just another liability waiting to mature.</p><blockquote><p><strong>Every control is a contract. Every rule is a recurring bill.</strong></p></blockquote><p>The longer you operate without acknowledging this, the more expensive your security becomes.</p><h2><strong>&#128173; Closing Thought</strong></h2><p>What&#8217;s your team&#8217;s real operational cost? Audit your detections, playbooks, and controls to see what you&#8217;re still paying for in time, toil, and attention.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/the-operational-cost-of-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/the-operational-cost-of-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[Don't Lose Your Edge]]></title><description><![CDATA[What Returning to Nigeria After 9 Years Taught Me.]]></description><link>https://www.cyberwoxunplugged.com/p/dont-lose-your-edge</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/dont-lose-your-edge</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Thu, 16 Oct 2025 14:31:20 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8322c99b-3d62-44ff-ac45-a4814ee1e605_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few weeks ago, I came back from my first trip to Nigeria in 9 years.</p><p><strong>Nine years.</strong></p><p>Nine years of learning, grinding, building, and changing in ways I didn&#8217;t fully understand until I went back.</p><p>And somewhere between the chaos of Abuja&#8217;s traffic and the peace of being home again&#8230; I realized something.</p><p>Man&#8230;what an advantage. But also, what a paradox.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DrMo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DrMo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DrMo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DrMo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DrMo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DrMo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg" width="768" height="677" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:677,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:168642,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/173943224?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3afc3c-1725-4c2e-bf2e-ff9111898dbe_768x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DrMo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DrMo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DrMo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DrMo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd389bf77-bbd6-419a-8966-dd279cabe8b2_768x677.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Walking on the streets of the Federal Capital of Nigeria (Abuja).</em></figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h2><strong>The Advantage</strong></h2><p>There&#8217;s something special about being an immigrant, or really, anyone who&#8217;s ever had to start from zero.</p><p>You see two worlds. You understand scarcity and abundance.</p><p>You carry a perspective most people don&#8217;t even know exists. Your perspective gives you clarity.</p><p>Your clarity gives you resilience. Your resilience gives you staying power.</p><p>In a weird way, you learn to thrive with limited resources, and then when you finally get access to more, you move like someone who still remembers what it&#8217;s like to have none.</p><p>That&#8217;s your edge. That&#8217;s your advantage.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8roz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8roz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8roz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8roz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8roz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8roz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg" width="768" height="742" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:742,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:224128,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/173943224?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1425b22f-5cfd-4959-b4e9-1ed5e2d60f24_768x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8roz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8roz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8roz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8roz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd48f1d04-6fb9-4aeb-bbb1-a3f0897acc68_768x742.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Trying some freshly made local delicacies.</figcaption></figure></div><div><hr></div><h1><strong>The Trap</strong></h1><p>But here&#8217;s the part you don&#8217;t notice:</p><blockquote><p><strong>That advantage fades fast.</strong></p></blockquote><p>When you finally get comfortable, the fire that once pushed you forward quietly goes out.</p><p>When the stakes aren&#8217;t as high anymore, urgency disappears. And slowly, you start coasting.</p><p>It&#8217;s the same thing that happens in cybersecurity careers.</p><p>You get the job, you learn the tech stack, you detect the threats, you respond to the incidents, you automate the redundant security work.</p><p><strong>You make the multiple six figures salary.</strong></p><p>And somewhere in between performance reviews, raises, and promotions, you lose that early hunger. The hunger that made you stay up late tinkering in your home lab, studying packet captures for fun, or learning that new programming language.</p><p>You stop chasing mastery and start chasing stability.</p><p><em>Now, don&#8217;t get me wrong, stability is good.</em></p><p>It&#8217;s okay to find peace in your work, to want consistency, to finally breathe after years of grinding.</p><blockquote><p><strong>But stability shouldn&#8217;t become complacency.</strong></p></blockquote><p>You can be content without being stagnant. You can rest without losing your edge.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JJHf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JJHf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JJHf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JJHf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JJHf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JJHf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg" width="768" height="839" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:839,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:133249,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/173943224?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa855cb14-1692-45ef-9cc7-3cf720e1f95a_768x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JJHf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JJHf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JJHf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JJHf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f68271-cd33-4e02-bfa7-3febc08c4f38_768x839.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The traditional attire for my friend&#8217;s wedding.</figcaption></figure></div><div><hr></div><h1><strong>Lesson Learned</strong></h1><p>The immigrant advantage, just like your early-career edge, isn&#8217;t something you get once and keep forever.</p><p>It&#8217;s something you have to protect, and you protect it by staying curious.</p><p>By building things even when no one&#8217;s asking.</p><p>By mentoring others and realizing how much you still have to learn.</p><p>By pushing yourself into discomfort because comfort is where edges go to die.</p><blockquote><p><strong>If you ever want to know where your career is headed, don&#8217;t look at your title or your pay. Look at your edge.</strong></p></blockquote><p>Is it sharper than it was a year ago?</p><p>Or has comfort slowly dulled it?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YUac!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YUac!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YUac!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YUac!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YUac!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YUac!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg" width="768" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:193422,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/173943224?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677a1f4f-7560-413f-9772-3f9399835afe_768x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YUac!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YUac!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YUac!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YUac!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe307c791-bbba-440b-af87-bb5ea96e1d3d_768x813.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Shopping for Nigerian history books at the airport bookstore.</figcaption></figure></div><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,900 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like reading, fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1><strong>Five Years In</strong></h1><p>This year marks my fifth year in cybersecurity.</p><p>From breaking into the field with nothing but curiosity and persistence, to hunting for threats at Amazon&#8217;s scale and helping others start their own journey, the lesson that keeps repeating is simple:</p><blockquote><p><strong>Never lose the edge that got you here.</strong></p></blockquote><p>Five years in, I&#8217;ve learned that skill can be taught, titles can change, and opportunities can evolve&#8230;but that hunger, that fire that made you chase growth in the first place, that&#8217;s what keeps you alive in this field.</p><p>The real advantage for me isn&#8217;t just being an immigrant.</p><p>It&#8217;s not being early in my career.</p><p>It&#8217;s staying hungry long after I no longer need to be.</p><p>That&#8217;s how you build longevity in cybersecurity &#8212; and in life.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/dont-lose-your-edge?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/dont-lose-your-edge?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[HashiConf 2025 Recap - The Future of Cloud, AI, and Security]]></title><description><![CDATA[Expert insights from conversations around agentic infrastructure, GPU efficiency, and security that's actually shifting left.]]></description><link>https://www.cyberwoxunplugged.com/p/hashiconf-2025-recap-expert-insights</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/hashiconf-2025-recap-expert-insights</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 10 Oct 2025 16:51:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ac8ef5a6-a1f6-4df8-a23d-d4c8f6c2662a_1440x810.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Three days in San Francisco. Hundreds of engineers, architects, and builders. And one central theme: <strong>infrastructure is getting smarter</strong>.</p><p><a href="https://bit.ly/3JQfHJD">HashiConf 2025</a> marked a turning point for how we think about automation, visibility, and security in the AI age. The announcements appear to be puzzle pieces forming a bigger vision of what HashiCorp plans for the future of<em> </em>infrastructure<em>,</em>&nbsp;which involves systems that understand context before they act.</p><p>From <em><a href="https://www.youtube.com/live/Wkw0X7-C6WU?si=HCdvYmK4_EmZkgNI&amp;t=3078">Project Infragraph</a></em> to the rise of MCP-powered AI operations, every keynote, demo, and hallway conversation hinted at the same shift: the future of DevOps and cloud security is about orchestration backed b<strong>y context</strong>.</p><p>This issue of&nbsp;<em>Cyberwox Unplugged</em>&nbsp;explores that future. </p><p>I already outlined the major releases and announcements in my vlog, so this newsletter will focus on practical insights from the field and discussions with key figures shaping the next phase, including HashiCorp&#8217;s leadership and practitioners working at a large scale.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p>Watch the full HashiConf 2025 vlog on the CYBERWOX YouTube channel for clips from these interviews and behind-the-scenes moments from San Francisco.</p><div id="youtube2-uJ9SIXZgLcU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;uJ9SIXZgLcU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/uJ9SIXZgLcU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1><strong>Standout Announcements</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X-fI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X-fI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!X-fI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!X-fI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!X-fI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X-fI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;HashiCorp Previews the Future of Agentic Infrastructure Automation with  Project infragraph - Sep 25, 2025&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="HashiCorp Previews the Future of Agentic Infrastructure Automation with  Project infragraph - Sep 25, 2025" title="HashiCorp Previews the Future of Agentic Infrastructure Automation with  Project infragraph - Sep 25, 2025" srcset="https://substackcdn.com/image/fetch/$s_!X-fI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!X-fI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!X-fI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!X-fI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f2aa03b-6dfb-4092-951e-f5309890e75c_1920x1080.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Source</strong>: https://newsroom.ibm.com/2025-09-25-hashicorp-previews-the-future-of-agentic-infrastructure-automation-with-project-infragraph</figcaption></figure></div><ul><li><p><strong>Project Infragraph</strong>&nbsp;offers a real-time, unified graph for managing multi-cloud and hybrid states. This feature is in private beta, expected in December 2025. Think of it as live topology and relationships that agentic systems can analyze.&nbsp;</p></li><li><p><strong>MCP servers</strong>&nbsp;(Model Context Protocol) for&nbsp;<strong>Terraform</strong>,&nbsp;<strong>Vault</strong>, and&nbsp;<strong>HCP Vault Radar</strong>&nbsp;are now in <a href="https://www.hashicorp.com/en/blog/building-intelligent-infrastructure-automation-with-hashicorp">public beta</a>. They enable AI tools to securely initiate runs, read state, and execute common operations from an IDE or client. This serves as the link between current platforms and future agents.&nbsp;</p></li><li><p><strong>Terraform</strong> gains more pragmatic power with <strong><a href="https://developer.hashicorp.com/terraform/language/stacks/update-GA">Stacks GA</a></strong>, <strong>Actions</strong> for &#8220;Day 2&#8221; ops, and <strong>Terraform Search</strong> (long-requested) to discover unmanaged resources and bring them under IaC. Fewer click-ops, less drift.</p></li><li><p><strong>Packer</strong>&nbsp;now offers&nbsp;<strong>SBOM storage (GA)</strong>&nbsp;and&nbsp;<strong>package visibility (beta)</strong>&nbsp;to mark images with provenance and software bills of materials, providing supply-chain transparency from the initial boot.&nbsp;</p></li><li><p><strong><a href="https://www.hashicorp.com/en/blog/strengthen-security-with-vault-boundary-and-radar-features-at-hashiconf-2025">Vault &amp; Radar</a></strong>&nbsp;updates enable secrets protection directly within your code editor, offering features like pre-commit detection, IDE workflows, and Jira SaaS scanning to ensure secrets are fixed before reaching the repository.&nbsp;</p></li></ul><p>And so much more you can dive into below:</p><div id="youtube2-i7cpyJs9nZA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;i7cpyJs9nZA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/i7cpyJs9nZA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Expert Insights</h1><h2>Armon Dadgar on Simplifying Cloud Complexity</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gWs_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gWs_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gWs_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gWs_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gWs_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gWs_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg" width="3840" height="1843" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1843,&quot;width&quot;:3840,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:956892,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/175673016?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9bd06d5-11b9-4bda-b8cf-da0673cd8fb7_3840x4800.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gWs_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gWs_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gWs_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gWs_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c41d16-aacf-4e59-a76b-80cfca1291a0_3840x1843.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Conversation with Armon.</figcaption></figure></div><p>When I asked <strong><a href="https://www.linkedin.com/in/armon-dadgar/">Armon Dadgar</a></strong>, Co-founder and CTO of HashiCorp, how he envisions helping organizations stay secure and operationally resilient as AI and multi-cloud adoption expand, his answer centered on three core themes: </p><ul><li><p><strong>standardization</strong></p></li><li><p><strong>managed delivery</strong>, and </p></li><li><p><strong>AI-augmented visibility</strong></p></li></ul><blockquote><p>&#8220;When we talk about our hybrid cloud operating model, it&#8217;s about how do you get to a standardized platform approach&#8230; Most enterprises are highly fragmented&#8212;they have a hundred app teams doing it a hundred different ways, and that&#8217;s an unmanageable level of complexity. You&#8217;re never going to get good at that, or be able to secure that.&#8221;</p></blockquote><p>For Armon, security at scale begins with <strong>a unified platform strategy</strong> for provisioning, secrets management, and key management. Fragmentation, he noted, is the real enemy of operational maturity. The more unique patterns that emerge across teams, the harder it becomes to secure and automate them.</p><p>He went on to highlight a second primary focus: the <strong>HashiCorp Cloud Platform</strong> and the company&#8217;s broader <strong>managed services</strong> push.</p><blockquote><p>&#8220;A lot of organizations lack the skills to actually deliver this stuff. So our big focus is: how do we run it as a managed service? We&#8217;ll handle integrations, backups, upgrades&#8212;all the stuff most teams struggle with.&#8221;</p></blockquote><p>This reflects a long-term shift for HashiCorp from just being a tool provider to becoming a&nbsp;<strong>platform operator</strong>&nbsp;that helps enterprises consume secure infrastructure as a service, rather than a burden.</p><p>But Armon&#8217;s third point revealed where HashiCorp&#8217;s roadmap is truly heading: visibility and context through <strong>Project Infragraph</strong>.</p><blockquote><p>&#8220;When I look at most outages or security issues, it&#8217;s not one system in isolation&#8212;it&#8217;s a chain of dependencies. The only way you solve that complexity is by visualizing it and seeing it.&#8221;</p></blockquote><p>Infragraph, he explained, will help organizations <strong>map and understand relationships across their infrastructure</strong>, making cause-and-effect more visible across teams, clouds, and environments.</p><p>And once visibility is established, AI can play a significant operational role.</p><blockquote><p>&#8220;Once you can visualize and see those relationships, that&#8217;s when AI augmentation starts making sense. You add MCP interfaces to something like Infragraph, and it starts unlocking day-two automation&#8212;the stuff we can&#8217;t really do today because the systems have no context.&#8221;</p></blockquote><p>That last line says it all. </p><p>It doesn&#8217;t seem like HashiCorp is just chasing AI for the sake of hype. They seem to be building a&nbsp;<em>contextual foundation</em>&nbsp;that AI needs to operate responsibly in production systems, where visibility (from the context) is a fundamental requirement for AI autonomy.</p><p>Armon summed up the company&#8217;s mission clearly:</p><blockquote><p>&#8220;Drive standardization, get to simplicity through a platform strategy, create consistent visibility, and ultimately help drive AI day-two operations.&#8221;</p></blockquote><div><hr></div><h2>Will Bengtson on Platform Security and the Future of Infragraph</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PTMC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PTMC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PTMC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PTMC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PTMC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PTMC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg" width="3840" height="1900" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1900,&quot;width&quot;:3840,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:884114,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/175673016?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54286dc8-e360-4079-97ba-dda7fb02c549_3840x4800.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PTMC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PTMC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PTMC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PTMC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35b193a2-7f7f-4ba6-8ea9-82b49701eb87_3840x1900.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Conversation with Will.</figcaption></figure></div><p>In our conversation, <strong><a href="https://www.linkedin.com/in/william-bengtson/">Will Bengtson</a></strong>, VP of Platform and Security Engineering at HashiCorp, gave a practical look into how HashiCorp runs its own products internally, as well as what excites him most about the company&#8217;s latest announcements.</p><blockquote><p>&#8220;I own our cloud platform, HCP, and security&#8230; probably the most used tool for my teams is Terraform. Infrastructure as code lets us launch new features and deploy Infragraph with security baked in from the start.&#8221;</p></blockquote><p>He also highlighted the critical role of <strong>Vault</strong> in their CI/CD processes and how it ties directly into <strong>HCP</strong> (HashiCorp Cloud Platform) &#8212; bringing secret management and compliance checks closer to the build pipeline. But when asked about his personal favorite tool, he didn&#8217;t hesitate:</p><blockquote><p>&#8220;The one I love the most is Packer. Immutable infrastructure. Instead of patching, we just rebuild and redeploy. You can move infrastructure really fast.&#8221;</p></blockquote><p>The mindset of rebuilding an image reflects a security engineer&#8217;s instinct to prefer known-good baselines over accumulated risk. It&#8217;s also the type of thinking that makes HashiCorp&#8217;s internal engineering culture mirror the ideals it advocates to its customers.</p><p>When we got into new announcements from HashiConf, Will pointed straight to <strong>Project Infragraph</strong>:</p><blockquote><p>&#8220;The one I&#8217;m hearing the most buzz about is Infragraph. From a security perspective, asset management&#8230; from an ops perspective, being able to dig into a vulnerability, figure out where it lives in HCP or Packer, and trace it back into Terraform&#8212;that&#8217;s powerful.&#8221;</p></blockquote><p>Seeing Infragraph&#8217;s first live demo alongside the rest of the audience, he noted that the <strong>natural language pre-built queries</strong> stood out the most:</p><blockquote><p>&#8220;The pre-canned questions are super important&#8212;especially if you&#8217;ve never used it. You can filter and explore without needing to do everything manually. I thought the natural language hit hard.&#8221;</p></blockquote><p>That&#8217;s the vision of Infragraph in action: making infrastructure and dependency visibility accessible not just to engineers but to anyone managing security and reliability at scale.</p><p>Before wrapping up, Will mentioned his next big &#8220;side project&#8221; &#8212; welcoming a new baby into the world. But even with that personal milestone ahead, his mind is already turning to what&#8217;s next for AI inside HashiCorp&#8217;s ecosystem:</p><blockquote><p>&#8220;I&#8217;m really just trying to figure out where we&#8217;re going with AI next in our products. That&#8217;s going to be my new side project.&#8221;</p></blockquote><p><em>All the best, Will!</em></p><div><hr></div><h3>Brian Chong on Scale, SBOMs, and the Next Layer of Infrastructure</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EEeE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EEeE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EEeE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EEeE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EEeE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EEeE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg" width="3840" height="1805" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1805,&quot;width&quot;:3840,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1036502,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/175673016?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9e9ea03-e9cd-4b7a-88b7-0d81d365f4ad_3840x2160.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EEeE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EEeE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EEeE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EEeE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8741da64-f48a-4171-818e-f9c67e70d98a_3840x1805.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Conversation with Brian.</figcaption></figure></div><p><strong><a href="https://www.linkedin.com/in/brian-chong-52512b/">Brian Chong</a></strong>, Director of Infrastructure and Security at <strong>Rubrik</strong>, brought a large-scale enterprise perspective to the table. His teams rely heavily on HashiCorp tooling&#8212;<strong>Terraform, Packer, and Vault</strong>&#8212;with an eye toward expanding into <strong>Nomad</strong> and <strong>Consul</strong> to extend automation beyond infrastructure and into service-level orchestration.</p><blockquote><p>&#8220;Our three main tools are Terraform, Packer, and Vault. But we&#8217;re looking at Nomad and Consul as well.&#8221;</p></blockquote><p>When asked which of the new announcements caught his attention, Brian didn&#8217;t hesitate:</p><blockquote><p>&#8220;From my world, Terraform Actions. That&#8217;s going to help unify some of our toolsets and hopefully let me eliminate a few we already have. Optimization at our scale is always important.&#8221;</p></blockquote><p>For him, the other standout was the new <strong>SBOM integration in Packer</strong>.</p><blockquote><p>&#8220;As a security and compliance leader, SBOMs are a big deal. With the recent executive orders and all the discussion around supply-chain security, it&#8217;s good to see HashiCorp taking it seriously.&#8221;</p></blockquote><p>He emphasized that the ability to automatically embed and track software bill of materials data directly within image metadata will streamline compliance workflows and help meet evolving regulatory requirements.</p><p>Looking ahead, Brian and his team are exploring <strong>Consul for service discovery and service mesh</strong>.</p><blockquote><p>&#8220;We want to scale from infrastructure into the application tier. And integrating SBOM data into compliance systems will be a key next step.&#8221;</p></blockquote><div><hr></div><h2>Rob Barnes on Nomad, Terraform Actions, and Building for the Ecosystem</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NQRd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NQRd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NQRd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NQRd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NQRd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NQRd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg" width="3840" height="1524" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1524,&quot;width&quot;:3840,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:832144,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/175673016?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4de081-021b-4a34-a183-31927a336d30_3840x4800.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NQRd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NQRd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NQRd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NQRd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F700149e4-e968-4e51-86b0-086500e7e06b_3840x1524.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Conversation with Rob.</figcaption></figure></div><p>In our conversation at HashiConf, <strong><a href="https://www.linkedin.com/in/devopsrob/">Rob Barnes</a></strong>, Senior Developer Advocate at HashiCorp, shared a grounded perspective on Nomad&#8217;s flexibility, the future of Terraform, and what drives his work in connecting users to better workflows.</p><blockquote><p>&#8220;Nomad is very underrated. It&#8217;s extremely flexible&#8212;which for me is one of its core strengths. It&#8217;s also extremely scalable&#8230; especially for high-performance workloads.&#8221;</p></blockquote><p>Rob emphasized that while Nomad has long been seen as an alternative to Kubernetes, its scalability and simplicity make it an ideal choice for modern use cases, particularly in <strong>AI data centers</strong>, where speed and orchestration efficiency are critical. </p><p>When asked about the feature he&#8217;s most excited about from the conference, Rob didn&#8217;t hesitate:</p><blockquote><p>&#8220;The clear winner is obviously Terraform Actions. Everyone&#8217;s super excited about that.&#8221;</p></blockquote><p>He reflected on how Terraform Actions addresses a long-standing community desire for post-deployment operations&#8212;something many had tried to solve with Ansible-style provisioning. Rob admitted that HashiCorp&#8217;s earlier stance (&#8220;you have images, you don&#8217;t need provisioners&#8221;) made sense for its time, but <em>&#8220;the world&#8217;s moved on.&#8221;</em></p><p>Now, Terraform Actions marks a major advancement in transforming Terraform from just a provisioning tool into a&nbsp;<strong>comprehensive lifecycle automation platform</strong>.</p><p>Beyond the announcements, Rob&#8217;s mindset as a developer advocate stood out. He talked about maintaining the <strong>Terraform provider &#8220;<a href="https://www.hashicorp.com/en/blog/writing-terraform-for-unsupported-resources">Terracurl</a>&#8221;</strong>, which has surpassed two million downloads, and how the new features will soon impact his work directly.</p><blockquote><p>&#8220;I can already see I&#8217;m going to start getting issues saying&#8212;&#8216;Can you implement Terraform Actions?&#8217; Once the conference season dies down, that&#8217;s probably what I&#8217;ll be working on.&#8221;</p></blockquote><p>Outside of his conference workload, Rob&#8217;s also working on a <strong>five-part blog series on secrets consumption patterns </strong>(<a href="https://www.hashicorp.com/blog/nomad-secrets-consumption-patterns-nomad-variables">part 1</a> &amp; <a href="https://www.hashicorp.com/blog/nomad-secrets-consumption-patterns-vault-integration">part 2</a>), exploring how organizations can better manage secrets at runtime across AWS Fargate and EC2 environments.</p><blockquote><p>&#8220;I&#8217;m always looking at the problems people are facing and how, from an ecosystem perspective, we can build integration paths between where we are and where our users are.&#8221;</p></blockquote><div><hr></div><h2>Tameika Reed on Accessibility, AI, and the Future of Infrastructure</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9HF5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9HF5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9HF5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9HF5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9HF5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9HF5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg" width="3840" height="1654" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1654,&quot;width&quot;:3840,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:897445,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/175673016?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8682503e-cdb1-458c-8b6c-d3f9dfdd8b50_3840x4800.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9HF5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9HF5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9HF5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9HF5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fe280a-667e-4272-8b8c-52bbfd7dca87_3840x1654.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Conversation with Tameika.</figcaption></figure></div><p><strong><a href="https://www.linkedin.com/in/tameika-reed/">Tameika Reed</a></strong>, founder of <em>Women in Linux</em> and infrastructure leader working across edge, cloud, and multi-cloud platforms, brought an energy to our conversation that cut straight to the heart of what HashiConf 2025 was all about.</p><blockquote><p>&#8220;By day I lead a team of infrastructure and platform engineers building out edge nodes, cloud computing in multi-cloud environments, and securing those environments &#8212; on-prem, edge, and in the cloud.&#8221;</p></blockquote><p>Her team&#8217;s toolkit reads like a HashiCorp product lineup: <strong>Boundary, Consul, Terraform, Vault</strong>, and even integrations with <strong>OpenShift</strong>, which she was particularly excited to see officially supported.</p><blockquote><p>&#8220;I&#8217;m glad they integrated OpenShift with Vault &#8212; that was a big announcement.&#8221;</p></blockquote><p>But what stood out most in our talk was how personal this evolution felt to her. Back in <strong>2019</strong>, Tameika sat with Armon Dadgar in Amsterdam and shared a prediction:</p><blockquote><p>&#8220;I said it&#8217;d be great to use AI on the backend of Terraform Cloud &#8212; to make suggestions based on what people have already deployed. To help them improve their infrastructure.&#8221;</p></blockquote><p>Fast forward to 2025, and that idea has manifested as <strong>Terraform Search</strong> and <strong>MCP servers</strong> &#8212; both of which she views as major steps toward a more intelligent, guided DevOps experience.</p><blockquote><p>&#8220;Here we are from 2019 to what we see now &#8212; Terraform Search, with import, and MCP servers that can make suggestions. If I&#8217;m a startup, I can use ChatGPT, Terraform Cloud, and MCP to spin up infrastructure really quickly &#8212; even without the budget for a full team yet.&#8221;</p></blockquote><p>Tameika sees this not just as a technical improvement, but as an <em>equalizer</em>. For early-stage startups or small teams, these features bridge the gap between idea and implementation, allowing teams to deploy quickly, learn faster, and introduce governance later.</p><blockquote><p>&#8220;Maybe I don&#8217;t have the money to maintain it just yet, but I can get up and running quickly. Then later, I can bring in someone to help maintain or govern it.&#8221;</p></blockquote><p>When asked which announcements stood out to her most, she pointed to the same tools shaping the new AI-first operations model:</p><blockquote><p>&#8220;I&#8217;m most excited about the MCP side and Terraform Search&#8230; Terraform Search helps people who already have infrastructure deployed &#8212; they don&#8217;t have to spend time importing it manually. It&#8217;s already there. Just import it, and you&#8217;re done.&#8221;</p></blockquote><p>For Tameika, MCP is a sign of how AI is transforming <em>how engineers learn and work</em></p><p>Tameika also raised an interesting question about the future of <strong>education and certification</strong> in this new AI-driven world.</p><blockquote><p>&#8220;How does AI change exams? Are we going to be able to use AI on the exam when we&#8217;ve been using it all this time? Are we at the age now where exams don&#8217;t matter?&#8221;</p></blockquote><p>It&#8217;s a fair question, honestly, and one that resonates across every industry where copilots and coding assistants are already part of daily workflows. If AI becomes the default partner in real-world engineering, traditional assessments might need to change to focus on&nbsp;<em>judgment and design thinking</em>, not just rote memorization.</p><p>Looking ahead, Tameika&#8217;s curiosity is far from slowing down. She&#8217;s currently studying <strong>Generative AI and security</strong>, exploring how tools like <strong>Vault</strong>, <strong>OpenShift</strong>, and <strong>MCP</strong> can converge into a secure, automated infrastructure workflow.</p><p>She&#8217;s also heading to <strong>KubeCon</strong>, where she expects to see how players like IBM, Red Hat, and HashiCorp might position themselves within the broader AI and quantum ecosystem.</p><blockquote><p>&#8220;Just my personal opinion, but I think they&#8217;re looking to make a play with or alongside Palantir.&#8221;</p></blockquote><p>And her long-term prediction feels both bold and inevitable:</p><blockquote><p>&#8220;We&#8217;re going to reach a point where everyone&#8217;s just creating workflows. You&#8217;ll drag and drop what you want, it&#8217;ll generate the Terraform code for you, and you&#8217;ll hit run.&#8221;</p></blockquote><p>That vision aligns perfectly with what&#8217;s already unfolding as infrastructure creation becomes more visual, collaborative, and accessible.</p><blockquote><p>&#8220;No one cares that you know infrastructure as code. We just need to know: can you check it, does it work, and how much is it going to cost?&#8221;</p></blockquote><div><hr></div><h2>Nasiullha Chaudhari on MCP Servers, AI, and Community Learning</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tATQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tATQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tATQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tATQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tATQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tATQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg" width="3840" height="1600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:3840,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1040313,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/175673016?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c972c7f-0c66-437e-a1a9-3cba532e5acf_3840x4800.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tATQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tATQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tATQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tATQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cfcd8f8-4486-4c95-90f0-9d282d43cbd2_3840x1600.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Conversation with Nasiullha.</figcaption></figure></div><p><strong><a href="https://www.linkedin.com/in/nasiullha-chaudhari/">Nasiullha Chaudhari</a></strong>, better known as <em><a href="https://www.youtube.com/@cloudchamp">Cloud Champ</a></em> to his 160,000+ YouTube subscribers, joined HashiConf 2025 as both a <strong>HashiCorp Ambassador</strong> and a passionate community educator.</p><p>His content centers around cloud, DevOps, and automation, and that perspective showed clearly in our conversation.</p><blockquote><p>&#8220;I use HashiCorp tools like Terraform, Waypoint, Boundary, and Consul. I&#8217;m here to learn more so I can use them better and share that knowledge with my community.&#8221;</p></blockquote><p>When we talked about this year&#8217;s wave of announcements, Nasiullha didn&#8217;t hesitate to share his excitement centered around the <strong>new MCP Servers</strong>.</p><blockquote><p>&#8220;Most importantly it&#8217;s going to be MCP Servers, because initially HashiCorp didn&#8217;t have an MCP server under their name. Now they do&#8212;for Terraform and other tools. I use Terraform the most, so I&#8217;m excited because with MCP, you can just tell the LLM in your language what you want, and it can do it for you.&#8221;</p></blockquote><p>He described it as a major change in how people will create and control infrastructure, no longer relying on declarative files but instead using&nbsp;<strong>natural language instructions</strong>&nbsp;that generate Terraform configurations automatically.</p><blockquote><p>&#8220;You can say, &#8216;I want to create infrastructure on AWS for my application,&#8217; and it&#8217;ll do it without you writing the code. And since it&#8217;s good for production&#8212;you can even use modules and complex setups. I&#8217;m eager to test that out.&#8221;</p></blockquote><p>But Nasiullha&#8217;s curiosity didn&#8217;t stop with MCP. He also spoke about <strong>Mitchell Hashimoto&#8217;s return</strong> and the reveal of <em>The Story of Code</em> project:</p><blockquote><p>&#8220;I&#8217;m also excited to see what&#8217;s going on there and why Mitchell&#8217;s back. We saw the trailer, and it looked really interesting. With IBM now in the mix, I think we&#8217;re going to see even more exciting changes.&#8221;</p></blockquote><p>That curiosity reflects what I&#8217;m also experiencing. I&#8217;m eager to see how HashiCorp&#8217;s new era under IBM unfolds with innovation while maintaining its open, developer-first spirit.</p><p>For Nasiullha, events like HashiConf are as much about <strong>connection as learning</strong>:</p><blockquote><p>&#8220;These conferences give you exposure. They tell you what&#8217;s new, help you connect with other ambassadors and experts. I&#8217;m here to connect, learn, and grow.&#8221;</p></blockquote><p>After the conference, his focus shifts right back to his audience:</p><blockquote><p>&#8220;I&#8217;ll go back and start recording my videos again&#8212;it&#8217;s been long. I miss creating content. I also attend other conferences like KubeCon and DevOps events, but I&#8217;ll definitely be back for HashiConf 2026 in Atlanta.&#8221;</p></blockquote><div><hr></div><h1>Takeaways</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UYPq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UYPq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png 424w, https://substackcdn.com/image/fetch/$s_!UYPq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png 848w, https://substackcdn.com/image/fetch/$s_!UYPq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png 1272w, https://substackcdn.com/image/fetch/$s_!UYPq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UYPq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png" width="1200" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Event Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Event Image" title="Event Image" srcset="https://substackcdn.com/image/fetch/$s_!UYPq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png 424w, https://substackcdn.com/image/fetch/$s_!UYPq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png 848w, https://substackcdn.com/image/fetch/$s_!UYPq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png 1272w, https://substackcdn.com/image/fetch/$s_!UYPq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F015d8223-aafc-4436-b16d-5fc0059e1f71_1200x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Source</strong>: https://www.hashicorp.com/en/conferences/hashiconf</figcaption></figure></div><p>HashiConf 2025 was a mirror reflecting where the entire industry is heading.</p><p>Every conversation I had, from <strong>Armon Dadgar&#8217;s</strong> vision of agentic operations, to <strong>Will Bengtson&#8217;s</strong> emphasis on security baked into the platform, <strong>Rob Barnes&#8217;</strong> focus on ecosystem enablement, <strong>Tameika Reed&#8217;s</strong> push for developer accessibility through AI, <strong>Brian Chong&#8217;s</strong> enterprise lens on SBOMs and compliance, and <strong>Nasiullha Chaudhari&#8217;s</strong> community perspective, pointed toward the same reality:</p><p>The next era of cloud and security won&#8217;t be built by humans <em>or</em> machines. It&#8217;ll be built <em>with</em> them.</p><p>Infrastructure now needs to become more contextual because the tooling is shifting from things we configure to technological partners (AI) that we guide, systems that reason about their environment (AI), operate safely within policy (AI), and adapt as quickly as the organizations behind them (even more AI).</p><p>Automation appears to be evolving beyond infrastructure efficiency but more towards infrastructure resilience, backed by the aforementioned context.</p><p>And visibility, like the kind HashiCorp is now enabling through Infragraph, is evolving beyond dashboards and charts to bridge the trust gap between people, processes, and the AI that will soon help operate them.</p><p>As builders, our role must evolve from writing code that simply executes to designing &amp; architecting resilient systems at scale.</p><div><hr></div><p>A huge thank you to <strong>HashiCorp</strong> for sponsoring my trip to San Francisco for HashiConf 2025 and giving me the chance to meet so many brilliant builders and security minds in person.</p><p>This newsletter, however, isn&#8217;t sponsored by them. It&#8217;s an independent reflection written from my own experience, perspective, and conversations throughout the event.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/hashiconf-2025-recap-expert-insights?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/hashiconf-2025-recap-expert-insights?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Mistakes Keeping You Stuck (and How to Fix Them)]]></title><description><![CDATA[Five common mistakes that derail aspiring cybersecurity professionals and how to avoid them before they kill your career progress.]]></description><link>https://www.cyberwoxunplugged.com/p/how-to-kill-your-cybersecurity-progress</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/how-to-kill-your-cybersecurity-progress</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 03 Oct 2025 16:02:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b815ffdc-4858-43cd-8762-239dfb0acac0_1382x778.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Let&#8217;s be honest: the internet is full of endless tutorials, bootcamps, and videos that promise to &#8220;<strong>get you into cybersecurity.</strong>&#8221; However, if you&#8217;re not careful, you could inadvertently sabotage your career instead of accelerating it.</p><p>I&#8217;ve been in this space for five years now, working as a security engineer, mentoring hundreds of students, and teaching thousands through <a href="https://www.youtube.com/@DayCyberwox">YouTube</a> and <a href="https://cyberwoxacademy.com/">Cyberwox Academy</a>. </p><blockquote><p>I&#8217;ve seen brilliant people stall out not because they weren&#8217;t smart enough, but because of a few career-killing habits.</p></blockquote><p>If you want to actually land that cybersecurity role and grow, you need to avoid these traps.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3><strong>In Case You Missed It</strong></h3><p>I recently went through a cybersecurity 101 series. I&#8217;m sure you didn&#8217;t miss it, but if you did, here&#8217;s the whole workshop series in order:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;783d9869-8009-43c1-9306-ea4ee9f979a1&quot;,&quot;caption&quot;:&quot;When I first stumbled into the cybersecurity industry, I didn&#8217;t have a map.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part 0: Why I&#8217;m Sharing My Cybersecurity 101 Workshop&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T03:46:31.671Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!GIhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-0-why-im-sharing&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172315588,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;4e1af223-1878-496e-99c1-b0795f9c5c5f&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part I: Why It All Matters&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T12:02:57.917Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172312561,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:10,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;812e10ba-86e5-477b-aee8-42e1457b4be3&quot;,&quot;caption&quot;:&quot;In Part I, we discussed why cybersecurity matters in 2025: how it impacts every aspect of our lives, how data has become the new gold, and how finances can be compromised with a single breach.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part II: Foundations &amp; Attacks&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-15T12:01:58.640Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172313475,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;05819a4b-b053-44db-a3e7-6263ebe5b425&quot;,&quot;caption&quot;:&quot;In Part II, we outlined the fundamentals: the CIA Triad, threats, vulnerabilities, risk, and the most common attacks, such as ransomware and insider threats.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part III: Defense, Offense, and Career Pathways&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-22T14:22:09.552Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9CvF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-iii-defense&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172314130,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;943d7e27-229a-4158-bab9-072d1f151bcc&quot;,&quot;caption&quot;:&quot;Over the past few weeks, we&#8217;ve walked through the whole arc of my two-hour live workshop on cybersecurity.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101: Series Recap &amp; Next Steps&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-29T12:01:26.787Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wWgx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172317878,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h1>Mistake #1: Learning Everything at Once</h1><p>I&#8217;ve seen people trying to juggle <strong>Linux, PowerShell, Splunk, malware analysis, and offensive security</strong>&#8230; all at the same time. That&#8217;s not ambition. That&#8217;s burnout.</p><p>Cybersecurity is too deep a field for you to scatter your focus everywhere. </p><p>You need to <strong>choose a lane first</strong>.</p><ul><li><p>If you want to break into systems and networks and get paid to find vulnerabilities, choose <strong>offensive security</strong>.</p></li><li><p>If you want to defend against malicious attackers, detect threats, and build security controls, choose <strong>defensive security</strong>.</p></li></ul><p>Once you&#8217;ve built a foundation, you can always pivot. I&#8217;ve pivoted myself. </p><blockquote><p>This field is flexible, but only if you build <strong>depth</strong> before chasing <strong>breadth</strong>.</p></blockquote><div><hr></div><h2>Mistake #2: Believing a Single Certification Will Save You</h2><p>I love seeing people celebrate when they pass Security+, OSCP, or CCD. But here&#8217;s the truth: <strong>a cert alone won&#8217;t get you the job.</strong></p><blockquote><p>A certification is a <strong>signal of effort</strong>, not proof of ability. </p></blockquote><p>To stand out, you need to stack it with:</p><ul><li><p>Projects that show you can apply your knowledge.</p></li><li><p>Advanced or specialized training in your chosen area.</p></li><li><p>A strong resume and portfolio.</p></li></ul><p>Think of certs as <strong>a door-opener</strong>. Just because a door is open doesn&#8217;t mean you&#8217;re in the house.</p><div><hr></div><h2>Mistake #3: Not Having a Structured Plan</h2><p>Jumping between random YouTube tutorials, free PDFs, and half-finished labs is how people waste years. </p><p><a href="https://youtu.be/frleh0eMXyM">You need structure.</a></p><p>That could be a degree, a bootcamp, or even a self-made plan. Personally, I built a <strong><a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">six-month Cybersecurity Learning Framework</a></strong> to help beginners stay on track, and it works because it forces you to commit to a path and see it through.</p><blockquote><p>Structure creates momentum. Without it, you&#8217;ll stay stuck in &#8220;learning mode&#8221; forever.</p></blockquote><div><hr></div><h2>Mistake #4: Chasing Shiny Objects</h2><p>This one hits close to home for me. </p><p>It&#8217;s so tempting to jump on the new hype wave of AI, blockchain, and cloud-native security right away, abandoning what you&#8217;re currently learning.</p><p>One minute you&#8217;re deep into a Windows memory analysis lab, the next you&#8217;re signing up for an &#8220;AI security&#8221; course you don&#8217;t even understand.</p><p>Here&#8217;s the fix: <strong>define your exact goal.</strong></p><p>Do you want to become:</p><ul><li><p>A detection engineer?</p></li><li><p>An incident responder?</p></li><li><p>A cloud security engineer?</p></li><li><p>An offensive security specialist?</p></li></ul><p>Each of those paths requires specific skills. </p><blockquote><p>Until you pick a target, you&#8217;ll keep drifting.</p></blockquote><div><hr></div><h2>Mistake #5: Neglecting Networking &amp; Mentorship</h2><p>I can&#8217;t stress this enough: <strong>relationships move careers.</strong></p><p>Cybersecurity is full of hidden opportunities, such as referrals, projects, collaborations, and even jobs that never hit LinkedIn job boards. </p><p>I&#8217;ve seen people land life-changing roles simply because they were active in their communities, attended conferences, or found the right mentor (me included).</p><blockquote><p>Yes, your skills matter. However, your network will accelerate your growth in ways that a pure technical grind never will.</p></blockquote><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,900 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like reading, fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h2>The Bottom Line</h2><p>Cybersecurity is huge. </p><p>There are countless domains, endless new tools, and more hype than you can keep up with. If you want to survive and thrive, you need to:</p><ul><li><p><strong>Focus deeply</strong> before broadening out.</p></li><li><p><strong>Build beyond certs</strong> with real projects.</p></li><li><p><strong>Stick to a structured plan.</strong></p></li><li><p><strong>Ignore distractions</strong> until you&#8217;ve mastered the fundamentals.</p></li><li><p><strong>Invest in people</strong> as much as you invest in skills.</p></li></ul><p>Your progress isn&#8217;t solely determined by your knowledge, but also by how you handle the journey.</p><p>The good news? These mistakes are fixable. Start now, and you can avoid wasting years of effort.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Cyberwox Unplugged</span></a></p><div><hr></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101: Series Recap & Next Steps]]></title><description><![CDATA[A CYBERWOX Unplugged Epilogue.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 29 Sep 2025 12:01:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wWgx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past few weeks, we&#8217;ve walked through the whole arc of my <strong>two-hour live workshop</strong> on cybersecurity.</p><p>What started as a room of students, career-switchers, and curious professionals asking simple questions &#8212; <em>&#8220;What exactly is cybersecurity?&#8221;</em> &#8212; turned into a deep dive on why this field matters, how attackers operate, and how you can build a career in it.</p><p>If you&#8217;ve been following along since Part I, thank you. If you&#8217;re finding this series now, you&#8217;re right on time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wWgx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wWgx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 424w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 848w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 1272w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wWgx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png" width="1024" height="969" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:969,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2268505,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!wWgx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 424w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 848w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 1272w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>In Case You Missed Anything</h3><p>Here&#8217;s the whole workshop series in order:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7d098626-4e2a-40c8-9690-32db09794560&quot;,&quot;caption&quot;:&quot;When I first stumbled into the cybersecurity industry, I didn&#8217;t have a map.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part 0: Why I&#8217;m Sharing My Cybersecurity 101 Workshop&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T03:46:31.671Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!GIhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-0-why-im-sharing&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172315588,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;89266e21-ba49-4746-a576-4e40c020630d&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part I: Why It All Matters&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T12:02:57.917Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172312561,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:10,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;fa772ab0-240b-439e-88fe-6789a03406b7&quot;,&quot;caption&quot;:&quot;In Part I, we discussed why cybersecurity matters in 2025: how it impacts every aspect of our lives, how data has become the new gold, and how finances can be compromised with a single breach.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part II: Foundations &amp; Attacks&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-15T12:01:58.640Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172313475,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;84cc8e2d-3523-451d-a36d-147f15e102ba&quot;,&quot;caption&quot;:&quot;In Part II, we outlined the fundamentals: the CIA Triad, threats, vulnerabilities, risk, and the most common attacks, such as ransomware and insider threats.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part III: Defense, Offense, and Career Pathways&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-22T14:22:09.552Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9CvF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-iii-defense&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172314130,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>The Bigger Lesson</h3><p>If there&#8217;s one theme across the entire workshop, it&#8217;s this: <strong>cybersecurity is a mission.</strong></p><p>Yes, it&#8217;s an industry with job titles and salaries. Yes, it&#8217;s a career with many entry points. But at its core, it&#8217;s about protecting people, data, and organizations from those who want to misuse them.</p><p>That mission is what keeps me learning, teaching, and building community through Cyberwox Academy and this newsletter.</p><div><hr></div><h3>What&#8217;s Next</h3><p>If this series lit a spark for you, here are your next steps:</p><ul><li><p>&#127909; <strong>Watch the complete edited workshop</strong> &#8212; available exclusively for <strong>Cyberwox members</strong> on YouTube.<br>&#128073;&#127997;<a href="#">Join here to unlock it</a></p></li><li><p>&#128682; <strong>Join the Cyberwox Academy Discord</strong> &#8212; 6,800+ members learning, building projects, sharing jobs, and supporting each other.<br>&#128073;&#127997; <a href="https://discord.gg/cyberwoxacademy">Join the community her</a>e</p></li><li><p>&#128240; <strong>Stay tuned right here on Cyberwox Unplugged</strong> &#8212; I&#8217;ll continue sharing reflections, career lessons, and deeper dives into the craft of cybersecurity.</p></li></ul><div><hr></div><h3>Final Word</h3><p>I started this series because I didn&#8217;t want the energy from that workshop to fade away after the room emptied. Now it resides here, accessible to anyone who needs it, whether you&#8217;re just curious about cybersecurity or ready to dive in headfirst.</p><p>If it gave you clarity, share it with someone who might need the same spark.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101, Part III: Defense, Offense, and Career Pathways]]></title><description><![CDATA[How Blue and Red Teams operate, and the practical ways you can build a career in cybersecurity.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-iii-defense</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-iii-defense</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 22 Sep 2025 14:22:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9CvF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In Part II, we outlined the fundamentals: the CIA Triad, threats, vulnerabilities, risk, and the most common attacks, such as ransomware and insider threats. </p><p>That provided us with a map of&nbsp;<em>what we&#8217;re defending against.</em></p><p>Now let&#8217;s talk about the people who do the defending, and those who play offense to make defenses stronger. From there, we&#8217;ll dive into the most practical question for many of you reading this:</p><blockquote><p><strong>How do you build a career in this field?</strong></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9CvF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9CvF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9CvF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!9CvF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p>&#9194; Check out parts 1 &amp; 2 if you&#8217;ve missed them!</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;10f3e228-f1fe-491a-bd80-1869740a8e5d&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part I: Why It All Matters&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T12:02:57.917Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172312561,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:10,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;805f21c6-76c9-4932-9f3e-91fe0ab0f1ef&quot;,&quot;caption&quot;:&quot;In Part I, we discussed why cybersecurity matters in 2025: how it impacts every aspect of our lives, how data has become the new gold, and how finances can be compromised with a single breach.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part II: Foundations &amp; Attacks&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-15T12:01:58.640Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172313475,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h1>The Blue Team: Defenders on the Frontline</h1><p>When most people think of &#8220;cybersecurity jobs,&#8221; they picture the <strong>Blue Team</strong>. These are the defenders, responsible for protecting organizations from day-to-day threats.</p><blockquote><p>I told the workshop: <em>&#8220;Think of the Blue Team as operating on five verbs: Monitoring, Analysis, Detection, Response, and Prevention.&#8221;</em></p></blockquote><ol><li><p><strong>Monitoring</strong> &#8211; Collecting logs and telemetry. Every system, every login, every file download generates a trail. At scale, this translates to billions of records per day. Monitoring gives us visibility.</p></li><li><p><strong>Analysis</strong> &#8211; Separating signal from noise. Not every failed login is an attack, but some are. Analysts sift through the haystack to find the needle.</p></li><li><p><strong>Detection</strong> &#8211; Writing rules and logic to catch bad activity automatically. For example: &#8220;Alert me if anyone logs in from outside Texas when all our employees are based here.&#8221;</p></li><li><p><strong>Response</strong> &#8211; Once an alert fires, the real work begins. Investigating what happened, containing it before it spreads, eradicating the threat, and remediating the environment.</p></li><li><p><strong>Prevention</strong> &#8211; Instead of waiting for threats, build guardrails that prevent them from occurring in the first place. Think strong identity checks, firewalls, or policies that block risky behavior.</p></li></ol><p>Within the Blue Team, careers range from <strong>SOC Analyst</strong> to <strong>Detection Engineer</strong> to <strong>Incident Responder</strong> to <strong>Cloud Security Engineer</strong>. Each has its own flavor, but all share the same mission: protect confidentiality, integrity, and availability.</p><div><hr></div><h1>The Red Team: Offense for Good</h1><p>The <strong>Red Team</strong> takes a different approach. Instead of waiting for attackers, they simulate them.</p><blockquote><p>I explained in the workshop: <em>&#8220;Cybersecurity borrows heavily from the military. Blue Teams defend. Red Teams attack.&#8221;</em></p></blockquote><p>Red Teamers, penetration testers, and adversary emulation specialists attempt to break into systems in the same manner as a malicious hacker would. The difference?</p><p>Their job is to <strong>report the weaknesses they find so that they can be addressed and fixed.</strong></p><p>It&#8217;s offense in service of defense.</p><p>Red Team roles include:</p><ul><li><p><strong>Penetration Testers</strong> &#8211; Contracted to test apps, networks, or infrastructure.</p></li><li><p><strong>Adversary Emulation Specialists</strong> &#8211; Simulate real-world attackers (e.g., APT groups) to see how defenders respond.</p></li><li><p><strong>Red Team Engineers/Operators</strong> &#8211; Build the tools, exploits, and campaigns used in simulations.</p></li></ul><p>Where the Blue Team thrives on logs and detections, the Red Team thrives on creativity, exploitation, and thinking like an attacker.</p><div><hr></div><h3>Audience Q&amp;A Moment</h3><p>One audience member asked: </p><blockquote><p><em>&#8220;So which side is better &#8212; Blue or Red?&#8221;</em></p></blockquote><p>My answer: neither. Both exist because of each other. Red Teams keep Blue Teams sharp. Blue Teams build the guardrails, Red Teams test.</p><p>For careers, it comes down to personality:</p><ul><li><p>Do you love puzzles, detection logic, and digging through logs? Blue might fit.</p></li><li><p>Do you love breaking things, exploiting systems, and thinking adversarially? Red might fit.</p></li></ul><p>And the truth is, you can pivot between the two. Many professionals (myself included) have worn both hats over the years.</p><div><hr></div><h1>Career Pathways Into Cybersecurity</h1><p>Now to the part most people lean forward for: <em>&#8220;How do I get in?&#8221;</em></p><p>I broke it down into <strong>four practical pathways</strong>, and I&#8217;ll expand on them here.</p><h4>1. Certifications (Practical &gt; Theoretical)</h4><p>I emphasized in the workshop that a cert is<strong>n't</strong>&nbsp;a guaranteed ticket to a job. But a good cert offers structure, demonstrates knowledge, and, if practical, shows you can actually do the work.</p><p>My top recommendations:</p><p><strong>For Blue Team (Defensive Security):</strong></p><ul><li><p><strong>Blue Team Level 1 (BTL1)</strong> &#8211; Security Blue Team. Hands-on, 24-hour scenario-based cert.</p></li><li><p><strong>Certified Defensive Security Analyst (CDSA)</strong> &#8211; Hack The Box. Covers monitoring + response.</p></li><li><p><strong>Certified CyberDefender (CCD)</strong> &#8211; CyberDefenders. 48-hour, practical detection + response.</p></li></ul><p><strong>For Red Team (Offensive Security):</strong></p><ul><li><p><strong>PNPT (Practical Network Penetration Tester)</strong> &#8211; TCM Security. Affordable, hands-on.</p></li><li><p><strong>OSCP (Offensive Security Certified Professional)</strong> &#8211; Industry standard. An intense 24-hour exam where you must exploit systems and write a report.</p></li></ul><div><hr></div><h4>2. College (Strategic, but Choose Wisely)</h4><p>Not all degrees are equal. My honest take? </p><blockquote><p><strong>Skip cybersecurity degrees unless they are practical.</strong> </p></blockquote><p>Most are heavy on theory, light on skills.</p><p>Better options:</p><ul><li><p><strong>Computer Science</strong> &#8211; Builds coding + math depth, which makes you far stronger in modern security roles.</p></li><li><p><strong>SANS Institute</strong> &#8211; Expensive, but elite. Highly practical and industry-respected.</p></li><li><p><strong>WGU (Western Governors University)</strong> &#8211; Affordable, cert-heavy, NSA recognized. Great for career switchers.</p></li><li><p><strong>RIT (Rochester Institute of Technology)</strong> &#8211; One of the best U.S. programs in cybersecurity.</p></li></ul><div><hr></div><h4>3. Projects (Proof You Can Do the Work)</h4><p>I can&#8217;t stress this enough: <strong>projects differentiate you.</strong></p><ul><li><p>Build a detection for a real attack in Splunk and blog about it.</p></li><li><p>Analyze malware samples in a home lab and share your findings.</p></li><li><p>Write about how you set up a SIEM, an IDS, or a honeypot at home.</p></li></ul><p>Projects show initiative, practical ability, and communication skills. Employers love seeing them on resumes, GitHub, or LinkedIn.</p><div><hr></div><h4>4. Labs &amp; Practice Grounds</h4><p>Don&#8217;t just read &#8212; practice. The best platforms:</p><ul><li><p><strong>TryHackMe</strong> &#8211; Beginner-friendly, guided labs for both Blue and Red. $14/month is worth it.</p></li><li><p><strong>HackTheBox</strong> &#8211; More advanced, great for offensive practice.</p></li><li><p><strong>Your Own Home Lab</strong> &#8211; The ultimate. Spin up virtual machines, simulate attacks, and practice detection. It&#8217;s how I sharpened my skills early on, and I still use mine.</p></li></ul><div><hr></div><h3>Transferable Skills Count Too</h3><p>If you&#8217;re already in an IT help desk, sysadmin, or networking role, you have a head start. Many of those skills are directly applicable to cybersecurity. </p><p>It&#8217;s easier to pivot from IT to security than from scratch.</p><div><hr></div><h3>The Community Advantage</h3><p>Cybersecurity isn&#8217;t a solo sport. That&#8217;s why I built the <strong>Cyberwox Academy Discord</strong>: a community of over 6,800 members where students, professionals, and recruiters share jobs, resources, and guidance. </p><blockquote><p>I told the workshop: <em>&#8220;I can&#8217;t answer every question alone, but together, this community can.&#8221;</em></p></blockquote><p>Joining spaces like this not only accelerates learning but also exposes you to opportunities. People have literally landed jobs just by networking inside.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h3>Closing Reflection</h3><p>By the end of the workshop, I wanted the room to walk away with this: <strong>Cybersecurity is a mission, and it needs people.</strong> Whether you lean defensive, offensive, or somewhere in between, there&#8217;s space for you here.</p><p>But breaking in requires more than memorizing definitions. It requires:</p><ul><li><p>Building <strong>practical skill</strong> through certs, labs, and projects.</p></li><li><p>Learning to <strong>communicate risk</strong> in business terms.</p></li><li><p>Plugging into a <strong>community</strong> that pushes you forward.</p></li></ul><p>If you do that, not only will you break in &#8212; you&#8217;ll thrive.</p><div><hr></div><h3>&#127909; Watch the Full Workshop (Cyberwox Members Only)</h3><p>If you&#8217;d like to watch the <strong>complete edited two-hour workshop</strong>, it&#8217;s available exclusively to my <strong>Cyberwox Squad and Syndicate members</strong> on YouTube.</p><p>&#128073;&#127997; <a href="https://youtu.be/HyzprIMUpBI">Join here and watch the full session</a>.</p><div><hr></div><p>&#9989; That&#8217;s the conclusion of this 3-part series: <strong>Cybersecurity 101. </strong>If you&#8217;ve read this far, you&#8217;re already ahead of most people trying to understand this field. Share this with someone who needs to know this.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101, Part II: Foundations & Attacks]]></title><description><![CDATA[The CIA Triad, threats, vulnerabilities, and the real attacks shaking organizations and individuals today.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 15 Sep 2025 12:01:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In Part I, we discussed why cybersecurity matters in 2025: how it impacts every aspect of our lives, how data has become the new gold, and how finances can be compromised with a single breach.</p><p>Now it&#8217;s time to get a little more structured.</p><p>When I teach cybersecurity, I always emphasize that we need <strong>foundations</strong>&#8212;concepts that simplify a massive, complex field into something we can actually build on.</p><p>That&#8217;s where the <strong>CIA Triad</strong> comes in. And no, I&#8217;m not talking about the spy agency.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dF61!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!dF61!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!dF61!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!dF61!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dF61!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!dF61!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!dF61!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!dF61!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!dF61!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><em>&#9194; Check out part 1 (why it all matters) if you&#8217;ve missed it!</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e4c891d8-d22e-4e7d-822a-eb46a3687375&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part I: Why It All Matters&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T12:02:57.917Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172312561,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:9,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h1>The CIA Triad: Cybersecurity&#8217;s North Star</h1><p>At one point in the workshop, I asked: <em>&#8220;How do we make sense of something as broad as cybersecurity?&#8221;</em></p><blockquote><p>My answer: Start with the <strong>CIA Triad</strong> &#8212; Confidentiality, Integrity, and Availability. </p></blockquote><p>These three principles are the foundation of everything we do.</p><ul><li><p><strong>Confidentiality</strong> - Ensuring that only authorized individuals can access the data.</p><ul><li><p>Imagine your mortgage account. Only you and an authorized individual from your bank should have access to this information. Confidentiality is what prevents your neighbor, your co-worker, or a hacker on the other side of the world from peeking in. In practice, we enforce this through encryption, access controls, and identity verification.</p></li></ul></li><li><p><strong>Integrity</strong> - Ensuring the data isn&#8217;t tampered with.</p><ul><li><p>If your mortgage account lists you as <em>Dayspring Johnson</em>, integrity ensures no one can sneak in and flip that to <em>James Johnson</em>. If that change happened, the system would now recognize James as the owner. Integrity keeps systems from being manipulated behind your back.</p></li></ul></li><li><p><strong>Availability </strong>-<strong> </strong>Ensuring you can access your data when you need it.</p><ul><li><p>If ransomware locks down your bank account, retirement funds, or even your laptop, then your data may still exist, but it&#8217;s unavailable to you. And in practice, that&#8217;s the same as losing it.</p></li></ul></li></ul><blockquote><p>I told the room, <em>&#8220;If you remember nothing else from today, remember these three. Break any one of them, and security collapses.&#8221;</em></p></blockquote><div><hr></div><h1>Threats, Vulnerabilities, and Risk</h1><p>Once you know the CIA Triad, the next question is: <em>what actually threatens these three pillars?</em></p><p>We use three words constantly in this industry: <strong>threats, vulnerabilities, and risk.</strong></p><ul><li><p><strong>Threats</strong> &#8211; These are individuals or forces that attempt to cause harm. Attackers trying to break in, steal data, or disrupt availability. A ransomware crew is a threat. An insider misusing access is a threat.</p></li><li><p><strong>Vulnerabilities</strong> &#8211; These are the weaknesses in your system that threats exploit. An unpatched server. A weak password. A misconfigured cloud bucket. No matter how &#8220;secure&#8221; we think we are, vulnerabilities always exist. That&#8217;s why vulnerability management is a whole career path of its own.</p></li><li><p><strong>Risk</strong> &#8211; This is how businesses understand all of it. You can tell an executive, &#8220;There&#8217;s an RCE in the web service,&#8221; but that won&#8217;t land. Instead, we say: <em>&#8220;There&#8217;s a high risk of customer data exposure that could cost millions.&#8221;</em> Risk is the translation layer between technical threats and business impact.</p></li></ul><blockquote><p>I explained in the workshop: <em>&#8220;If we can&#8217;t communicate in terms of risk, we fail the business. Cybersecurity is often seen as a cost center. Unless we show the value of reducing risk, leadership won&#8217;t keep investing in us.&#8221;</em></p></blockquote><p>This is why terms like <strong>low risk, medium risk, and high risk</strong> exist. </p><p>They&#8217;re not just words &#8212; they&#8217;re how we justify budgets, policies, and jobs.</p><div><hr></div><h1>When Cybersecurity Becomes a Cost Center</h1><p>I highlighted an important point: most companies see cybersecurity as a cost rather than a revenue generator. It doesn&#8217;t generate income directly, but it helps avoid losses.</p><p>However, the exception is when you work <strong>for a cybersecurity company</strong>. </p><p>For vendors like CrowdStrike and SentinelOne, as well as cloud providers like AWS and Microsoft, security <em>is</em> the product. </p><p>In those cases, cybersecurity is a revenue generator, not a cost center.</p><p>Understanding this distinction helps you see why translation to &#8220;risk language&#8221; is critical. </p><p>If your leadership only sees cost with no apparent benefit, security budgets disappear quickly.</p><div><hr></div><h1>Common Cyber Attacks</h1><p>With foundations set, I shifted the workshop into what most people really wanted to know: <em>what does this look like in the real world?</em></p><p>We explored two common, dangerous attack types.</p><h2><strong>1. Ransomware: Digital Kidnapping</strong></h2><p>I asked the room to imagine this: you log into your computer, and suddenly everything is locked. A message pops up demanding Bitcoin. If you don&#8217;t pay, not only will you never see your files again, but the attacker promises to leak them to the world.</p><p>That&#8217;s ransomware.</p><p>Attackers infiltrate, encrypt, and extort. They make billions every year. Ransomware campaigns have paralyzed entire governments, hospitals, and school districts.</p><p>In the workshop, I broke down how they get in (called <strong>initial access vectors</strong>):</p><ul><li><p>Phishing emails</p></li><li><p>Typo-squatted websites (e.g., <em>bnkofamerica.com</em> instead of <em>bankofamerica.com</em>)</p></li><li><p>Malicious downloads disguised as free software or media</p></li><li><p>Even calling help desks and impersonating executives</p></li></ul><blockquote><p>And then I told the room: <em>&#8220;Stopping ransomware isn&#8217;t about one magic tool. Antivirus, EDR, firewalls &#8212; they help. But attackers evolve. That&#8217;s why we preach <strong>defense in depth</strong>: layered defenses across endpoints, networks, cloud, and people. One layer fails? Another should catch it.&#8221;</em></p></blockquote><h2><strong>2. Insider Threats: Danger on the Inside</strong></h2><p>The second attack type doesn&#8217;t involve outsiders breaking in. Its employees are misusing the access they already have.</p><p>I painted the picture:</p><blockquote><p>&#8220;You&#8217;re an accountant at a bank. You have access to social security numbers, retirement accounts, and client records. You notice one account has $20 million sitting in it. Meanwhile, you&#8217;re making $70,000. The temptation is real.&#8221;</p></blockquote><p>That&#8217;s an insider threat. </p><p>And it&#8217;s why companies need not only external defenses, but also monitoring and policies for insiders. In fact, the team I work on at Amazon focuses heavily on insider threats because insiders already understand systems, already have access, and can often cause just as much damage as an external attacker.</p><div><hr></div><h1>Audience Q&amp;A Moments</h1><p>This was one of my favorite parts of the workshop &#8212; people weren&#8217;t shy about asking questions.</p><blockquote><p><strong>Q: What&#8217;s the point of an antivirus if attackers always bypass it?</strong></p></blockquote><p>I explained that legacy antivirus was &#8220;signature-based,&#8221; relying on known file fingerprints. Attackers quickly learned to modify files so that signatures no longer matched. Modern tools are behavioral, so they look at what a file does. </p><p>But even then, attackers adapt. That&#8217;s why <strong>prevention</strong> (not downloading shady files in the first place) is stronger than relying purely on detection tools.</p><blockquote><p><strong>Q: Should I accept cookies on websites?</strong></p></blockquote><p>Cookies mainly track you. </p><p>I usually deny them, or at least clear them often. Better yet, use privacy-focused browsers like Brave. But the bigger lesson is this: <em>you always have the freedom not to use a site if it feels invasive.</em> Exercising that choice is part of your personal security posture.</p><blockquote><p><strong>Q: What if I already downloaded something shady?</strong></p></blockquote><p>If you only downloaded it, delete it. </p><p>If you opened it, assume persistence and consider a complete reset or reimage. Painful, yes &#8212; but safer. Attackers often build mechanisms that survive reboots or file deletions.</p><div><hr></div><h1>Practical Tools I Recommended</h1><p>I also gave the room some practical starting points anyone could use:</p><ul><li><p><strong>Malwarebytes</strong> &#8211; A free (with paid tier) tool that blocks malicious websites and downloads.</p></li><li><p><strong>Microsoft Defender</strong> &#8211; Comes built into Windows and is often enough to catch common threats.</p></li><li><p><strong>Skepticism</strong> &#8211; Still the best defense. If something feels off, question it before you click.</p></li></ul><div><hr></div><h3>Wrapping Up Part II</h3><p>By the end of this section of the workshop, the room had a clearer picture: cybersecurity isn&#8217;t just about hackers in hoodies. It&#8217;s about <strong>protecting confidentiality, integrity, and availability</strong>; translating threats into risks businesses can understand; and recognizing that both ransomware crews and insiders pose real dangers.</p><p>In <strong>Part III</strong>, we&#8217;ll go deeper into the <strong>people side of defense</strong>: how Blue Teams monitor, detect, and respond, how Red Teams attack to make systems stronger, and the real career pathways you can take to join the fight.</p><div><hr></div><h3>&#127909; Watch the Full Workshop (Cyberwox Members Only)</h3><p>If you&#8217;d like to watch the <strong>complete edited two-hour workshop</strong>, it&#8217;s available exclusively to my <strong>Cyberwox Squad and Syndicate members</strong> on YouTube.</p><p>&#128073;&#127997; <a href="https://youtu.be/HyzprIMUpBI">Join here and watch the full session</a>.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><p>&#9989; Next up: <strong>Cybersecurity 101, Part III: Defenders, Offense, and Careers</strong></p><p><em>How Blue and Red Teams operate, and the practical ways you can build a career in cybersecurity.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101, Part I: Why It All Matters]]></title><description><![CDATA[The mission behind security, how it shapes your everyday life, and why data and money make you a target.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 08 Sep 2025 12:02:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain. </p><p>Not quick hot takes. Not polished LinkedIn posts. </p><p>This is where I reflect, document, and share the more profound lessons that shape my career and this community.</p><p>Earlier this year, I had the opportunity to give a <strong>two-hour live workshop</strong> on the fundamentals of cybersecurity, not just as a technical field, but as an <strong>industry, a career, and most importantly, a mission.</strong></p><p>The room wasn&#8217;t full of seasoned pros. </p><p>It was a mix of students, curious professionals, and individuals seeking to understand how hacking and security affect their daily lives. That&#8217;s why I removed the jargon and started from the ground up.</p><p>What follows in this three-part series is the <strong>whole arc of that workshop</strong>, adapted into long-form essays. </p><p>I haven&#8217;t skimmed or over-summarized. </p><p>I want you to feel the flow of the session, hear the audience questions, and absorb the stories that made people nod, laugh, or suddenly sit forward.</p><p>And for those of you in the <strong>Cyberwox Squad or Cyberwox Syndicate tiers</strong> on YouTube, the <strong>full edited workshop video</strong> is available in your <a href="https://youtu.be/HyzprIMUpBI">members-only feed</a>.</p><div><hr></div><h1>Setting The Tone</h1><p>No slides. No flashy animations. </p><p>Just me, a room full of people, and an honest conversation about cybersecurity.</p><p>That was intentional. I didn&#8217;t want to bore anyone with technical diagrams or a death-by-PowerPoint presentation. </p><p>Instead, I wanted to break down cybersecurity in plain English, connect it directly to people&#8217;s lives, and make the space feel interactive.</p><p>So before I even introduced myself, I asked three simple questions.</p><div><hr></div><h2>The Three Questions That Changed the Tone</h2><blockquote><p>&#8220;By a show of hands, how many of you have heard of cybersecurity or hacking?&#8221;</p></blockquote><p>Almost every hand in the room went up.</p><blockquote><p>&#8220;How many of you have ever been hacked&#8230;maybe your WhatsApp, your Facebook, or even your bank account?&#8221;</p></blockquote><p>Some hands stayed up, some went down. People laughed nervously, realizing how close to home this was.</p><blockquote><p>&#8220;Alright&#8230; now, how many of you have ever hacked someone else?&#8221;</p></blockquote><p>This one got the loudest reaction. Smiles, chuckles, side-eyes.</p><p>I started with those questions because it sets the tone: <strong>cybersecurity is not some abstract thing that only hackers in hoodies deal with. It&#8217;s already part of your life.</strong> </p><p>If your phone, car, accounts, or retirement money are online, then cybersecurity affects you every single day.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h1>Who I Am and Why This Matters</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BNAM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BNAM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:&quot;Generated image&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!BNAM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you're new here, I'm Day, and I'm 23 years old.</p><p>I&#8217;ve been working in cybersecurity for about half a decade. Here&#8217;s a snapshot of that journey:</p><ul><li><p>Started with an <strong>internship during my freshman year of college</strong> &#8212; one of the best ways to break into the field.</p></li><li><p>Worked across <strong>cloud security, threat detection, and incident response</strong>.</p></li><li><p>Most recently, I&#8217;ve been doing <strong>threat hunting, threat intelligence, and adversary emulation</strong>.</p></li><li><p>Today, I work on <strong>Amazon&#8217;s cybersecurity team</strong>, protecting global customers every single day.</p></li></ul><p>That list might sound like I&#8217;ve jumped around a lot, but that&#8217;s actually the strength of this industry. </p><p>Once you build one skillset, you can pivot into others. </p><p>Threat Detection skills make you a better responder. </p><p>Incident Response experience makes you a sharper Threat Hunter. </p><p>It&#8217;s all connected by one thing: <strong>protecting people and systems from attackers.</strong></p><div><hr></div><h1>Beyond a Career: Cybersecurity as a Mission</h1><p>When discussing careers, it&#8217;s tempting to focus on money, titles, and prestige. And yes, cybersecurity pays well, but here&#8217;s my perspective:</p><blockquote><p><strong>Cybersecurity is not just a career. It&#8217;s a mission.</strong></p></blockquote><p>That mission looks like this:</p><ul><li><p>Protecting your family and the people you care about.</p></li><li><p>Protecting companies that serve millions.</p></li><li><p>Protecting entire societies from adversaries who want to exploit weaknesses.</p></li></ul><p>When you see your work as a mission, it becomes easier to stay motivated. It fuels the grind of learning, experimenting, and growing. </p><p>Without that mission, cybersecurity can seem like an endless treadmill of alerts and acronyms. But with it, every detection, every fix, every analysis feels like being part of something bigger.</p><div><hr></div><h2>Why Cybersecurity Matters in 2025</h2><p>We have been through a global tech revolution for over twenty years. Now, every company, in some way, is a&nbsp;<strong>software or tech company</strong>.</p><ul><li><p>Your <strong>bank</strong> doesn&#8217;t just hold money; it runs databases, servers, apps, and APIs.</p></li><li><p>Your <strong>grocery store</strong> doesn&#8217;t just sell food; it manages online orders, payment systems, and delivery platforms.</p></li><li><p>Even the&nbsp;<strong>library,</strong>&nbsp;where I gave the workshop, runs portals, databases, and Wi-Fi services.</p></li></ul><p>Everywhere you look, the crown jewel is the same: <strong>data.</strong></p><div><hr></div><h2>Data Is the New Gold</h2><p>Here&#8217;s how I broke it down in the workshop:</p><p>Your name. Your phone number. Your address. Your income. Your browsing habits. Your medical records.</p><p>All of these are&nbsp;<strong>extremely valuable</strong>&nbsp;not only to companies that sell ads but also to adversaries.</p><ul><li><p>Companies use your data to target you with ads or develop more effective AI models.</p></li><li><p>Attackers use your data to steal your identity, open accounts in your name, or blackmail you.</p></li><li><p>Even something as simple as a leaked email and password combination can cascade into massive financial damage if reused across multiple accounts.</p></li></ul><blockquote><p>Data is leverage. </p></blockquote><div><hr></div><h2>The Financial Dimension</h2><p>The second crown jewel is money.</p><p>Bank accounts, mortgages, retirement savings &#8212; all of these live online now. </p><p>If an attacker compromises those systems, they don&#8217;t just inconvenience you; they can equally <strong>wreck your financial life.</strong></p><ul><li><p>They can open fraudulent loans.</p></li><li><p>They can max out credit cards.</p></li><li><p>They can drain retirement accounts.</p></li><li><p>They can even get mortgages in your name.</p></li></ul><p>At a bigger scale, if attackers compromise a financial institution itself, entire communities are at risk.</p><p>This is why cybersecurity is no longer optional. </p><p>If attackers control your <strong>data</strong> and your <strong>finances</strong>, they essentially control your life.</p><div><hr></div><h2>Why the Mission Is Urgent</h2><blockquote><p>In the workshop, I told the room, <em>&#8220;This is why we need more people in this industry. The attackers are motivated. The money is real. The harm is personal.&#8221;</em></p></blockquote><p>Ransomware alone is a&nbsp;<strong>billion-dollar criminal industry</strong>, rivaling drug cartels. And on the other side? Companies, governments, and individuals who often lack the defenses needed to keep up.</p><p>That gap is where cybersecurity professionals come in. </p><p>It&#8217;s why the <strong>mission</strong> matters.</p><div><hr></div><h3>Closing Thoughts for Part I</h3><p>That&#8217;s where I ended the opening portion of the workshop. Before diving into frameworks or attack types, I wanted everyone to sit with this truth:</p><blockquote><p><strong>Cybersecurity isn&#8217;t just for engineers. It already touches your everyday life. And the stakes are higher than ever.</strong></p></blockquote><p>In <strong>Part II</strong>, we&#8217;ll dig into the <strong>foundations of cybersecurity</strong>: the CIA Triad (Confidentiality, Integrity, Availability), threats, vulnerabilities, and how we translate all of that into the language businesses understand: risk.</p><div><hr></div><h3>&#127909; Watch the Full Workshop (Cyberwox Members Only)</h3><p>If you&#8217;d like to watch the <strong>complete edited two-hour workshop</strong>, it&#8217;s available exclusively to my <strong>Cyberwox Squad and Syndicate members</strong> on YouTube.</p><p>&#128073;&#127997; <a href="https://youtu.be/HyzprIMUpBI">Join here and watch the full session</a>.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><p>&#9989; Next up: <strong>Cybersecurity 101, Part II: Foundations &amp; Attacks</strong></p><p><em>The CIA Triad, threats, vulnerabilities, and the real-world attacks that are shaking organizations and individuals today.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101, Part 0: Why I’m Sharing My Cybersecurity 101 Workshop]]></title><description><![CDATA[Part 0: Introduction to the Series (Editor&#8217;s Note).]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-0-why-im-sharing</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-0-why-im-sharing</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 08 Sep 2025 03:46:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GIhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When I first stumbled into the cybersecurity industry, I didn&#8217;t have a map.</p><p>I was 18, a college freshman, and an immigrant trying to figure out not just how to pass classes, but how to carve out a future in an industry I barely understood. Back then, terms like <em>Blue Team</em> and <em>Red Team</em> sounded like code names from a movie, not real jobs people built careers around.</p><p>What kept me moving forward wasn&#8217;t confidence. It was a sense of mission. </p><p>I wanted to protect people even if I couldn&#8217;t yet explain how.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h1>Why This Series Exists</h1><p>Fast forward five years: I&#8217;ve worked across cloud security, detection engineering, incident response, and threat hunting at companies like Datadog and Amazon. </p><p>I&#8217;ve learned a lot. I&#8217;ve failed a lot. And through it all, one truth keeps showing up:</p><blockquote><p><strong>cybersecurity is intimidating until someone slows down long enough to make it human.</strong></p></blockquote><p>Recently, I gave a <strong>two-hour live workshop</strong> on the fundamentals of cybersecurity. The room wasn&#8217;t filled with experts. It was students, career-switchers, and curious professionals who wanted to know:</p><ul><li><p><em>What exactly is cybersecurity?</em></p></li><li><p><em>How does it affect me on a day-to-day basis?</em></p></li><li><p><em>How do people actually build careers in it?</em></p></li></ul><p>The questions were simple, but the conversations were powerful. </p><p>People leaned forward. They laughed. Some looked nervous when they realized how close to home these risks hit. That&#8217;s when I knew this workshop needed to live beyond that room.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>What You&#8217;ll Get Here</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GIhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GIhi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GIhi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:&quot;Generated image&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!GIhi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Over the following three newsletters, I&#8217;m sharing the whole arc of that workshop. </p><p>Not a skimmed recap. Not bullet-point slides. But the stories, the frameworks, and even the audience Q&amp;A that made the session come alive.</p><p>Here&#8217;s how it will unfold:</p><p><strong>Part I: Why Cybersecurity Matters in 2025</strong><br><em>The mission behind security, how it shapes your everyday life, and why data and money make you a target.</em></p><p><strong>Part II: Foundations &amp; Attacks</strong><br><em>The CIA Triad, threats, vulnerabilities, and the real-world attacks that are shaking organizations and individuals today.</em></p><p><strong>Part III: Defenders, Offense, and Careers</strong><br><em>How Blue and Red Teams operate, and the practical ways you can build a career in cybersecurity.</em></p><div class="pullquote"><h3>For Cyberwox Members</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UN9D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UN9D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 424w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 848w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1272w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UN9D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png" width="394" height="98.7706043956044" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:365,&quot;width&quot;:1456,&quot;resizeWidth&quot;:394,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UN9D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 424w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 848w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1272w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The <strong>full edited two-hour workshop video</strong> is available exclusively to my <strong>Cyberwox Squad and Syndicate members</strong> on YouTube.</p><p>&#128073;&#127997; <a href="https://youtu.be/HyzprIMUpBI">Join here and watch the whole session</a>.</p></div><h3>Why I Care</h3><p>Cyberwox Unplugged has always been the place where I write what I wish I had known when I was starting out. A space to slow down, to reflect, and to share both the technical lessons and the personal ones.</p><p>If you&#8217;re new, welcome. If you&#8217;ve been following for a while, thank you. Either way, my hope is simple: that this series gives you clarity, direction, and maybe even the spark of a mission that&#8217;s kept me going.</p><div><hr></div><h3>Let&#8217;s Begin</h3><p>Start with <strong>Part I: Why Cybersecurity Matters in 2025</strong> &#8594; <a href="https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all?r=2uq5cr">Read it here</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberwox Unplugged is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Cybersecurity Certification Trap]]></title><description><![CDATA[A Practical Framework for Choosing Cyber & Cloud Certs That Actually Move Your Career.]]></description><link>https://www.cyberwoxunplugged.com/p/the-cybersecurity-certification-trap</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/the-cybersecurity-certification-trap</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 05 Sep 2025 12:03:37 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/169317196/3e2193b03ab0bcaefc830bd8b7d9d6e6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>TL;DR (but don&#8217;t stop here)</h1><p>Most people burn time and money on certifications that don&#8217;t change their trajectory. Use this 4&#8209;question framework every time you consider a cert:</p><ol><li><p><strong>Career Value:</strong> <em>Does this tangibly move me toward the role I want?</em></p></li><li><p><strong>Hands&#8209;On Depth:</strong> <em>Will I build and prove real skills, not just memorize trivia?</em></p></li><li><p><strong>Planned Application:</strong> <em>Exactly how (and how soon) will I use these skills on the job or in projects?</em></p></li><li><p><strong>Faster Alternatives:</strong> <em>Is there a more practical path (cert, lab, project) that gets me further, faster?</em></p></li></ol><p>If the answer to any of these is weak, pass. Simple.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from various SOC analyst roles, investigating everything from endpoint threats to building detection systems for cloud-based abuse, so I know exactly what it takes to break into this field and make career advancements.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>The Problem: Cert Chasing Without Strategy</h1><p>I&#8217;ve taken numerous certifications for learning, career advancement, and as part of my time at WGU. </p><p>Some were worth it. Some weren&#8217;t. </p><p>The difference came down to one thing: <strong>did it create real leverage</strong> in my career?</p><p>2025 (or any year of your life) is not the time to spend on anything that doesn&#8217;t materially level you up. </p><p>No more paying for multiple&#8209;choice trivia that never shows up in your day job. </p><p>No more &#8220;I&#8217;ll just add this to my r&#233;sum&#233;&#8221; without a plan to apply it.</p><p>Let&#8217;s fix the way you evaluate certs&#8212;once and for all.</p><div><hr></div><h1>The 4&#8209;Question Certification Framework</h1><h2>1) <strong>Does it create career value?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8nDi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8nDi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8nDi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!8nDi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t start by asking &#8220;Is this cert popular?&#8221; Start by asking: <strong>&#8220;Does this push me directly toward the role, scope, or compensation band I&#8217;m targeting?&#8221;</strong></p><p><strong>How to test that quickly:</strong></p><ul><li><p>Pull 15&#8211;20 recent job postings for the role you want.</p></li><li><p>Highlight every required or &#8220;nice to have&#8221; cert. Notice the patterns.</p></li><li><p>Map the cert&#8217;s curriculum to the skills those jobs demand.</p></li><li><p>If there&#8217;s a weak or non&#8209;existent connection, skip it.</p></li></ul><blockquote><p>If it doesn&#8217;t move you toward your target role, it&#8217;s a distraction.</p></blockquote><h2>2) <strong>Does it teach you hands&#8209;on skills?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e-bo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e-bo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e-bo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!e-bo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Multiple&#8209;choice is not how modern teams validate your ability to <strong>ship</strong>, <strong>respond</strong>, <strong>detect</strong>, or <strong>break</strong> systems. </p><p>The market is flooded with practical training now. Use it.</p><p><strong>Prefer these styles of exams and programs:</strong></p><ul><li><p><strong>Hands&#8209;on labs</strong> in real or simulated environments</p></li><li><p><strong>Capstone projects</strong> that you can show and talk through</p></li><li><p><strong>Scenario-based exams</strong> (IR, SOC triage, malware, adversary emulation)</p></li><li><p><strong>Challenge platforms</strong> (HTB, TryHackMe, CyberDefenders) tied to certs</p></li></ul><p>Examples:</p><ul><li><p><strong>Defensive / SOC:</strong></p><ul><li><p><em>Security Blue Team</em> &#8212; <strong>BTL1</strong></p></li><li><p><em>CyberDefenders</em> &#8212; <strong>CCD</strong></p></li><li><p><em>Hack The Box</em> &#8212; <strong>CDSA</strong></p></li></ul></li><li><p><strong>Offensive:</strong></p><ul><li><p><em>TCM</em> &#8212; <strong>PNPT</strong></p></li><li><p><em>INE/eLearnSecurity</em> &#8212; <strong>eJPT, eCPPT, malware analysis tracks</strong></p></li><li><p><em>Offensive Security</em> &#8212; <strong>OSCP/OSEP</strong> (when you truly need that depth and rigor)</p></li></ul></li><li><p><strong>Cloud &amp; AppSec:</strong></p><ul><li><p><em>Cloud Breach</em> &#8212; Offensive AWS/Azure</p></li><li><p><em>Altered Security</em> &#8212; Azure AD, Azure application security</p></li><li><p><em>Microsoft &amp; AWS</em> &#8212; now adding real lab credits so you actually deploy and test (you get Azure credit to build and break things + AWS Free Tier)</p></li></ul></li><li><p><strong>DevSecOps:</strong></p><ul><li><p><em>DevSecOps Institute</em> and a growing set of <strong>hands&#8209;on</strong> DevOps/SRE/Supply-chain security certs</p></li></ul></li></ul><p>If it&#8217;s not practical, <strong>you&#8217;re paying to forget it.</strong></p><h2>3) <strong>How will you apply it immediately?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oduH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oduH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!oduH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!oduH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!oduH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oduH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!oduH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!oduH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!oduH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!oduH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you don&#8217;t use it, you will lose it. Rapidly.</p><p>Before you pay:</p><ul><li><p><strong>Define the use case.</strong> &#8220;I&#8217;m an IR analyst who wants attacker empathy, so I&#8217;ll take PNPT and immediately emulate those TTPs to harden our detections.&#8221;</p></li><li><p><strong>Define the artifact.</strong> &#8220;I will build a purple-team playbook, tune three detections, and push a Sigma rule PR by the end of the month.&#8221;</p></li><li><p><strong>Define the repetition loop.</strong> &#8220;Every Friday, I&#8217;ll spend 90 minutes re&#8209;running one offensive technique in the lab, documenting telemetry and defensive visibility gaps.&#8221;</p></li></ul><p>No plan to apply = guaranteed skill decay.</p><h2>4) <strong>Are there faster, more practical alternatives?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eTRb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eTRb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eTRb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!eTRb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Many legacy certs still get promoted because they&#8217;ve been around forever. That doesn&#8217;t mean they&#8217;re the best <em>for you</em>.</p><p><strong>Example:</strong> For the price of <strong>PenTest+</strong>, you can get <strong>PNPT</strong>, which gives you a complete end&#8209;to&#8209;end practical exam with reporting that mirrors real consulting work. </p><p>Same &#8220;destination&#8221; (penetration testing competency), but PNPT gets you there <strong>faster and deeper</strong>.</p><p>Ask yourself: <em>Is there a practical training program, project, lab series, or community-driven cert that gets me to demonstrable skill faster?</em></p><p>If yes, choose that.</p><div><hr></div><h1>A Simple Scorecard (Use This Before You Swipe Your Card)</h1><p>Score each question from <strong>0 to 3</strong>. Anything <strong>&lt;8 total</strong> is a pass for me.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cAJ0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cAJ0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 424w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 848w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 1272w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png" width="1456" height="473" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:473,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:110933,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/169317196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cAJ0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 424w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 848w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 1272w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Sample Scorecard Evaluation: PenTest+ vs PNPT</h3><h4>&#127919; Target Role: Junior Penetration Tester / Offensive Security Consultant</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wpL_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wpL_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 424w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 848w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 1272w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wpL_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png" width="1456" height="632" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:632,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:121166,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/169317196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wpL_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 424w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 848w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 1272w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Total Score</strong></p><ul><li><p><strong>PenTest+:</strong> 3/12 &#8594; &#10060; Skip (Low value, not practical)</p></li><li><p><strong>PNPT:</strong> 12/12 &#8594; &#9989; Strong pick (Career-aligned, hands-on, and applicable)</p></li></ul><div><hr></div><h1>Quick, Opinionated Shortlists</h1><p><strong>If you&#8217;re heading into SOC / IR / Detection Engineering</strong></p><ul><li><p>BTL1, CCD, CDSA, PJSA, SAL1</p></li><li><p>Practical Malware Analysis tracks (INE/eLearnSecurity)</p></li><li><p>Build Purple team labs (SCYTHE, Atomic Red Team, DetectionLab, etc.) + writeups</p></li></ul><p><strong>If you want Offensive Security / Adversary Emulation</strong></p><ul><li><p>PNPT (strong ROI)</p></li><li><p>CPTS, CJSA, PT1</p></li><li><p>eJPT &#8594; eCPPT progression</p></li><li><p>OSCP/OSEP when you need to clear that bar for specific roles or teams</p></li></ul><p><strong>If you&#8217;re focused on Cloud Security (Blue &amp; Red)</strong></p><ul><li><p>Cloud Breach (AWS/Azure offensive)</p></li><li><p>Altered Security (Azure AD, Azure appsec)</p></li><li><p>Microsoft certs are now increasingly tied to real Azure credits and labs&#8212;use them in a <em>practical</em> way.</p></li></ul><p><strong>If you&#8217;re going DevSecOps / Platform Security / Supply Chain</strong></p><ul><li><p>Practical DevSecOps</p></li><li><p>Supplement with hands-on lab work: IaC scanning, SCA/SBOM pipelines, signing/verification, policy-as-code</p></li></ul><div><hr></div><h1>Common Traps (Skip These)</h1><ul><li><p><strong>Certs you can&#8217;t map to a role you actually want.</strong></p></li><li><p><strong>MCQ exams sold as &#8220;industry standard&#8221; with no lab component.</strong></p></li><li><p><strong>&#8220;I&#8217;ll just learn it now for later&#8221;</strong> with no maintenance plan.</p></li><li><p><strong>Choosing the name-brand test when a practical, cheaper option exists.</strong></p></li><li><p><strong>Paying for prestige over proof.</strong> Hiring managers care far more about what you can <strong>do</strong> and <strong>show</strong>.</p></li></ul><div><hr></div><h1>If You&#8217;re Still in School (WGU, bootcamps, etc.)</h1><p>Use those required certs to <strong>build a practical foundation</strong>, then pivot hard into hands&#8209;on paths:</p><ul><li><p>Treat every &#8220;theory-heavy&#8221; cert as a <strong>primer</strong>, not the finish line.</p></li><li><p>Immediately wrap practical labs, projects, or purple-team exercises around the content.</p></li><li><p>Publish what you learn: detection writeups, IR playbooks, Sigma rules, Terraform modules, attack simulation notes&#8230; <strong>make it visible.</strong></p></li></ul><div><hr></div><h1>Action Plan (Do This Today)</h1><ol><li><p><strong>Define your target role</strong> (title, team, and comp band).</p></li><li><p><strong>Collect 15&#8211;20 job descriptions</strong> and extract the common required skills/tools.</p></li><li><p><strong>List 3&#8211;5 certs you&#8217;re considering</strong> and run them through the scorecard.</p></li><li><p><strong>Pick one</strong> that clears your bar.</p></li><li><p><strong>Write a 4-week application plan</strong>: what you&#8217;ll build, tune, emulate, or publish using those skills.</p></li><li><p><strong>Ship the artifact</strong>. Talk about it publicly (GitHub, blog, Substack, LinkedIn, X).</p></li><li><p><strong>Rinse, refine, repeat.</strong></p></li></ol><div><hr></div><h2>My Final Take</h2><p>Certifications can be either rocket fuel or busywork disguised as progress. </p><p>The difference is <strong>intentionality</strong>. </p><p>If it doesn&#8217;t add real value to your path, isn&#8217;t practical, won&#8217;t be applied, and has a better alternative, you already know the move: <strong>don&#8217;t take it</strong>.</p><p>Be surgical. Be practical. </p><p>Go further, faster<strong>, and smartly</strong>.</p><div><hr></div><h1><strong>Cyberwox Resources</strong></h1><h4><strong>Resources for your career</strong></h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><div><hr></div><h1><strong>Closing</strong></h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzUwMDM2MzYwLCJleHAiOjE3NTI2MjgzNjAsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.yefIOBQAgPrM20p1VQBblBYeHUOqudzpaRmbhfcKCa0&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/the-cybersecurity-certification-trap?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/the-cybersecurity-certification-trap?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Threat Intelligence Case Study: Dissecting a Multi-Stage Phishing Campaign Against YouTube Creators]]></title><description><![CDATA[They Tried to Hack Me With an &#8216;Undetected&#8217; Malware Loader using Google Drive, Cloudflare, and LOLBins.]]></description><link>https://www.cyberwoxunplugged.com/p/threat-intelligence-case-study-dissecting</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/threat-intelligence-case-study-dissecting</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 02 Sep 2025 12:00:37 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b414ad82-f7b4-41d4-b73c-fadc5df1457a_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Phishing has been around since the dawn of email, but it hasn&#8217;t stayed the same.</p><p>What once appeared as clumsy scams with broken English and shady attachments has evolved into sophisticated, multi-layered attacks. Modern attacker campaigns not only deceive users but also utilize legitimate cloud services and Windows tools to blend into regular activity seamlessly.</p><p>This analysis covers a recent phishing attack that targeted me personally as a YouTube creator. On the surface, it appeared to be just another &#8220;appeal your ban&#8221; email. But once analyzed, it unraveled into a sophisticated malware chain that used <strong>Google Drive for delivery</strong>, <strong>Cloudflare for hosting</strong>, and <strong>Microsoft binaries like </strong><code>mshta.exe</code><strong> and Excel</strong> as the actual malware delivery mechanism.</p><blockquote><p><strong>One important note</strong>: I learned much of this&nbsp;<em>in real time</em>. I haven&#8217;t worked in a purely Windows environment in a few years, so a lot of this was deducing and making inferences based on past knowledge, some training I&#8217;ve taken, and pure intuition.</p></blockquote><p>During my investigation, I didn&#8217;t start with a pre-written script or specific expectations. Instead, I learned each step in real-time, shifting from VirusTotal to ANY.RUN, dissecting a VBScript, and asking more questions as new behaviors appeared. </p><p>This approach makes this case worth sharing, as it involved not just analysis but a<strong>ctive learning in practice</strong>.</p><p>The goal here isn&#8217;t just to show <em>what happened</em>, but also <em>why it matters</em>. I&#8217;ll break down the campaign stage by stage, explain the attacker&#8217;s logic, and highlight what defenders can learn &#8212; whether you&#8217;re just starting out or already working in incident response.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div class="pullquote"><h3><strong>&#127909; Extended Video Analysis</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UN9D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UN9D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 424w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 848w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1272w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UN9D!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png" width="330" height="82.632" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:626,&quot;width&quot;:2500,&quot;resizeWidth&quot;:330,&quot;bytes&quot;:143194,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6caf0ef3-fc50-4c7a-bae0-ca03b365df52_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UN9D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 424w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 848w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1272w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>For readers who want to see this campaign in action, I&#8217;ve published a <strong>30-minute video analysis</strong> that walks through the complete sandbox detonation, script deobfuscation, and reflective loader behavior.</p><p>This video is available <strong>exclusively to Cyberwox Syndicate members on YouTube</strong>, along with a library of other technical breakdowns covering Detection Engineering, Threat Hunting scenarios, Incident Response case studies, Career Advice, Python Coding &amp; AI.</p><p><strong><a href="https://youtu.be/GlDCDxNOT1c">&#128204; </a></strong><em><strong><a href="https://youtu.be/GlDCDxNOT1c">Learn more about the Syndicate and gain access here</a>.</strong></em></p></div><h1>Analysis</h1><h2>Phase 1: Initial Access (The Phish)</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZKUg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZKUg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png 424w, https://substackcdn.com/image/fetch/$s_!ZKUg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png 848w, https://substackcdn.com/image/fetch/$s_!ZKUg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png 1272w, https://substackcdn.com/image/fetch/$s_!ZKUg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZKUg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png" width="1456" height="511" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:511,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:125409,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZKUg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png 424w, https://substackcdn.com/image/fetch/$s_!ZKUg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png 848w, https://substackcdn.com/image/fetch/$s_!ZKUg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png 1272w, https://substackcdn.com/image/fetch/$s_!ZKUg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa504f9e7-8120-4255-8e92-be6b13c353c1_1498x526.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://attack.mitre.org/tactics/TA0001/">Source</a>: </strong>TA0001</p><p>The email appeared deceptively routine: a&nbsp;<strong>Google Drive share</strong>&nbsp;notification informing me that my channel was at risk of being banned unless I filed an &#8220;appeal.&#8221;</p><p>Historically, phishing emails attached malicious Office documents or zipped EXEs. </p><p>In recent years, defenders have become more resilient against those vectors. As a result, attackers have shifted to:</p><ul><li><p><strong>Cloud file-sharing abuse</strong> (Google Drive, Dropbox, OneDrive) to bypass filters.</p></li><li><p><strong>Impersonation of high-value brands</strong> (YouTube, PayPal, Microsoft).</p></li><li><p><strong>Social urgency</strong>: &#8220;Act now, or lose access.&#8221;</p></li></ul><p>&#128248; <em>[Screenshot: phishing email / Google Drive link]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ch2s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ch2s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png 424w, https://substackcdn.com/image/fetch/$s_!Ch2s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png 848w, https://substackcdn.com/image/fetch/$s_!Ch2s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png 1272w, https://substackcdn.com/image/fetch/$s_!Ch2s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ch2s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png" width="1456" height="667" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:667,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:401815,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ch2s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png 424w, https://substackcdn.com/image/fetch/$s_!Ch2s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png 848w, https://substackcdn.com/image/fetch/$s_!Ch2s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png 1272w, https://substackcdn.com/image/fetch/$s_!Ch2s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F720c7ac8-237d-4137-8d5f-67625051cc52_2862x1312.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128248; <em>[Screenshot: phishing email / Vimeo too]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QuZg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QuZg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png 424w, https://substackcdn.com/image/fetch/$s_!QuZg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png 848w, https://substackcdn.com/image/fetch/$s_!QuZg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png 1272w, https://substackcdn.com/image/fetch/$s_!QuZg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QuZg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png" width="1456" height="906" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:906,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:403850,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QuZg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png 424w, https://substackcdn.com/image/fetch/$s_!QuZg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png 848w, https://substackcdn.com/image/fetch/$s_!QuZg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png 1272w, https://substackcdn.com/image/fetch/$s_!QuZg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9253b03-ba95-4b47-8a68-8eeea2639f60_2360x1468.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This was clearly not a <strong>handcrafted spearphish</strong>. </p><p>It appeared to be a campaign, hitting multiple inboxes simultaneously (redacted) with just enough polish to deceive distracted users.</p><div><hr></div><h2>Phase 2: The Fake Appeal Site &amp; Clipboard Hijacking</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7EyH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7EyH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png 424w, https://substackcdn.com/image/fetch/$s_!7EyH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png 848w, https://substackcdn.com/image/fetch/$s_!7EyH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png 1272w, https://substackcdn.com/image/fetch/$s_!7EyH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7EyH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png" width="1456" height="545" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:545,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:152205,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7EyH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png 424w, https://substackcdn.com/image/fetch/$s_!7EyH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png 848w, https://substackcdn.com/image/fetch/$s_!7EyH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png 1272w, https://substackcdn.com/image/fetch/$s_!7EyH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff577a58a-f375-477e-a467-c7df01ecfd35_1480x554.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://attack.mitre.org/techniques/T1566/002/">Source</a>: </strong>T1566.002</p><p>Clicking through the initial link <code>policy[.]video</code> led to <code>youtube.strike.alert[.]org</code> - a fake &#8220;YouTube Appeal Center.&#8221; </p><p>The page was convincing enough to mimic YouTube&#8217;s workflows.</p><p>&#128248; <em>[Screenshot: fake appeal page]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yfvg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yfvg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png 424w, https://substackcdn.com/image/fetch/$s_!Yfvg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png 848w, https://substackcdn.com/image/fetch/$s_!Yfvg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png 1272w, https://substackcdn.com/image/fetch/$s_!Yfvg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yfvg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png" width="1456" height="818" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:818,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:711653,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Yfvg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png 424w, https://substackcdn.com/image/fetch/$s_!Yfvg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png 848w, https://substackcdn.com/image/fetch/$s_!Yfvg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png 1272w, https://substackcdn.com/image/fetch/$s_!Yfvg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e44e0d7-472a-406f-ac30-9391aee228fd_2158x1212.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128248; <em>[Screenshot: me posing as Mr. Beast]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2FUG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2FUG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png 424w, https://substackcdn.com/image/fetch/$s_!2FUG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png 848w, https://substackcdn.com/image/fetch/$s_!2FUG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png 1272w, https://substackcdn.com/image/fetch/$s_!2FUG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2FUG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png" width="1456" height="722" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:722,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:871785,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2FUG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png 424w, https://substackcdn.com/image/fetch/$s_!2FUG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png 848w, https://substackcdn.com/image/fetch/$s_!2FUG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png 1272w, https://substackcdn.com/image/fetch/$s_!2FUG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b30b7a-b16c-4bf4-944b-f611bee47da8_2980x1478.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s the clever part: it didn&#8217;t even ask me to log in to my channel afterwards. </p><p>Instead, it auto-populated my <strong>clipboard</strong> with a command and told me to complete the appeal process by executing: <strong>Win+R &#8594; Paste &#8594; Enter.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6BRL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6BRL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png 424w, https://substackcdn.com/image/fetch/$s_!6BRL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png 848w, https://substackcdn.com/image/fetch/$s_!6BRL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png 1272w, https://substackcdn.com/image/fetch/$s_!6BRL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6BRL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png" width="1456" height="811" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:811,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:766871,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6BRL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png 424w, https://substackcdn.com/image/fetch/$s_!6BRL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png 848w, https://substackcdn.com/image/fetch/$s_!6BRL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png 1272w, https://substackcdn.com/image/fetch/$s_!6BRL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed13493-f524-4085-9175-91c79a825fc5_2980x1660.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>This represents a notable evolution in attacker techniques.</em> </p><p>Historically, attackers tricked users into downloading EXEs. Today, they <strong>social-engineer users into running native binaries</strong> already on their system. </p><p>This helps them to &#8220;Live Off The Land&#8221;.</p><blockquote><p>Also, clipboard hijacking is an under-discussed topic in phishing defense. Most training advises &#8220;don&#8217;t click links&#8221; but rarely emphasizes &#8220;be cautious about what you paste.&#8221;</p></blockquote><p>&#128248; <em>[Screenshot: Win+R instructions / pasted clipboard injection]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e2Mj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e2Mj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png 424w, https://substackcdn.com/image/fetch/$s_!e2Mj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png 848w, https://substackcdn.com/image/fetch/$s_!e2Mj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png 1272w, https://substackcdn.com/image/fetch/$s_!e2Mj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e2Mj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png" width="1456" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc417053-7f99-449a-a844-58c9be04d456_3016x1686.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:973078,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e2Mj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png 424w, https://substackcdn.com/image/fetch/$s_!e2Mj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png 848w, https://substackcdn.com/image/fetch/$s_!e2Mj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png 1272w, https://substackcdn.com/image/fetch/$s_!e2Mj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc417053-7f99-449a-a844-58c9be04d456_3016x1686.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><code>C:\WINDOWS\system32\mshta.exe hxxps://policy-agreement[.]com/DMCA_Notice.hta</code></p></blockquote><p>The paste leveraged <code>mshta.exe</code>, a signed Microsoft binary capable of fetching and executing remote HTA (HTML Application) files. </p><div><hr></div><h2>Tooling Transparency (Not Sponsored)</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QHnK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QHnK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 424w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 848w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1272w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png" width="1456" height="455" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/caf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:455,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QHnK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 424w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 848w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1272w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This analysis was powered heavily by <strong>ANY.RUN&#8217;s</strong> interactive malware sandbox, which made it possible to observe each stage of the phishing chain in real time.</p><p>This issue is <strong>not sponsored by ANY.RUN</strong>, but I want to be transparent in crediting the platform because it played a central role in uncovering everything laid out here.</p><p>For defenders who want to go deeper than running single samples, ANY.RUN recently rolled out <strong>Threat Intelligence Feeds</strong> that aggregate behavioral data across thousands of detonations. This expands visibility from &#8220;what happened in my one sandbox run&#8221; to &#8220;what&#8217;s happening across the wild right now.&#8221;</p><blockquote><p><a href="https://bit.ly/cwx-anyrun-threat-intelligence-lookup">&#128204; </a><em><a href="https://bit.ly/cwx-anyrun-threat-intelligence-lookup">If you&#8217;re serious about threat intelligence, threat hunting or detection engineering, it&#8217;s worth exploring.</a></em></p></blockquote><p>You can also find the ANY.RUN report for this investigation <a href="https://any.run/report/743ef8592f3778f2ec8eeb62862cf7082861cf38f95fc7255d1fbcc944c50a10/8ed30515-955e-48fe-92a7-a6f4b119aa4e?_gl=1*jkrgb5*_gcl_au*MjEzMTU5NTA2NC4xNzU0OTE3NDg0*FPAU*MjEzMTU5NTA2NC4xNzU0OTE3NDg0*_ga*NTU1Mzc2NDEuMTc1NDc5NjcxNw..*_ga_53KB74YDZR*czE3NTYzNTQ4MTkkbzIyJGcwJHQxNzU2MzU0ODE5JGo2MCRsMCRoODcwNTcxNTc1">here</a>.</p><div><hr></div><h2>Phase 3: MSHTA &amp; Living Off the Land</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fGZ-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fGZ-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png 424w, https://substackcdn.com/image/fetch/$s_!fGZ-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png 848w, https://substackcdn.com/image/fetch/$s_!fGZ-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png 1272w, https://substackcdn.com/image/fetch/$s_!fGZ-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fGZ-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png" width="1456" height="1023" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1023,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:278212,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fGZ-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png 424w, https://substackcdn.com/image/fetch/$s_!fGZ-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png 848w, https://substackcdn.com/image/fetch/$s_!fGZ-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png 1272w, https://substackcdn.com/image/fetch/$s_!fGZ-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17ec4a88-4a0c-451e-a47c-67f52b8ec91f_1478x1038.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://attack.mitre.org/techniques/T1218/005/">Source</a>:</strong> T1218.005 </p><p>MSHTA isn&#8217;t malware. It&#8217;s actually part of Windows, specifically a <strong>Living-Off-the-Land (LOLBIN) binary</strong>. </p><p>Attackers abuse it because:</p><ul><li><p>It&#8217;s trusted, signed by Microsoft.</p></li><li><p>It bypasses application whitelisting in many enterprises.</p></li><li><p>It supports remote execution of HTAs with full scripting capabilities (CRAZY WORK).</p></li></ul><p>&#128248; <em>[Screenshot: MSHTA Madness during analysis]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5E3O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5E3O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png 424w, https://substackcdn.com/image/fetch/$s_!5E3O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png 848w, https://substackcdn.com/image/fetch/$s_!5E3O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png 1272w, https://substackcdn.com/image/fetch/$s_!5E3O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5E3O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png" width="1456" height="1059" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1059,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:678373,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5E3O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png 424w, https://substackcdn.com/image/fetch/$s_!5E3O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png 848w, https://substackcdn.com/image/fetch/$s_!5E3O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png 1272w, https://substackcdn.com/image/fetch/$s_!5E3O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9144db08-a5d9-4b10-8eca-5f7f3ae17042_2252x1638.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Historically, MSHTA abuse goes back to at least 2017, when APT32 and FIN7 used it in phishing campaigns (maybe one of them is targeting influencers now). </p><p>In this case, <code>mshta.exe</code> was instructed to download and run an HTA file called <code>DMCA_notice.hta</code>from a remote server. </p><p>That file contained the next stage: <strong>VBScript code</strong>.</p><p><a href="https://redcanary.com/threat-detection-report/techniques/mshta/">Light reading on MSHTA from Red Canary</a>.</p><p><a href="https://lolbas-project.github.io/lolbas/Binaries/Mshta/">MSHTA LOLBIN Profile</a>.</p><div><hr></div><h2>Phase 4: The HTA Loader (VBScript &#8594; Excel)</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aubV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aubV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png 424w, https://substackcdn.com/image/fetch/$s_!aubV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png 848w, https://substackcdn.com/image/fetch/$s_!aubV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png 1272w, https://substackcdn.com/image/fetch/$s_!aubV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aubV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png" width="1456" height="805" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7556b11-2c87-486d-a75f-df87ff436047_1786x988.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:805,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:262979,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aubV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png 424w, https://substackcdn.com/image/fetch/$s_!aubV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png 848w, https://substackcdn.com/image/fetch/$s_!aubV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png 1272w, https://substackcdn.com/image/fetch/$s_!aubV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7556b11-2c87-486d-a75f-df87ff436047_1786x988.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://attack.mitre.org/techniques/T1218/005/">Source</a>: </strong>T1218.005</p><p>As mentioned previously, the downloaded HTA file contained obfuscated VBScript code. </p><p>This is where we begin to see the <strong>transition from social engineering to execution.</strong></p><blockquote><p>SN: I&#8217;m not all that familiar with VBScript, but I can get by.</p></blockquote><p>The VBScript:</p><ul><li><p>Spawned an <strong>Excel.Application</strong> COM object.</p></li><li><p>Temporarily enabled the registry key <code>AccessVBOM</code> (which governs programmatic access to the VBA project model).</p></li><li><p>Injected a Base64-decoded VBA macro directly into Excel.</p></li><li><p>Wired a <code>Workbook_NewSheet</code> event to ensure execution.</p></li></ul><p>&#128248; <em>[Screenshot: Registry key modification &#8211; AccessVBOM enabled]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3hta!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3hta!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png 424w, https://substackcdn.com/image/fetch/$s_!3hta!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png 848w, https://substackcdn.com/image/fetch/$s_!3hta!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png 1272w, https://substackcdn.com/image/fetch/$s_!3hta!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3hta!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png" width="1456" height="887" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:887,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:441406,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3hta!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png 424w, https://substackcdn.com/image/fetch/$s_!3hta!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png 848w, https://substackcdn.com/image/fetch/$s_!3hta!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png 1272w, https://substackcdn.com/image/fetch/$s_!3hta!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4092bf-c79f-4128-92e6-21ebc913729b_2600x1584.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128248; <em>[Screenshot: Subtle string concatenation obfuscation behavior]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VCeu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VCeu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png 424w, https://substackcdn.com/image/fetch/$s_!VCeu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png 848w, https://substackcdn.com/image/fetch/$s_!VCeu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png 1272w, https://substackcdn.com/image/fetch/$s_!VCeu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VCeu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png" width="1456" height="887" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0208ffc-d627-4023-a75a-906e91618770_2600x1584.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:887,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:428284,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VCeu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png 424w, https://substackcdn.com/image/fetch/$s_!VCeu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png 848w, https://substackcdn.com/image/fetch/$s_!VCeu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png 1272w, https://substackcdn.com/image/fetch/$s_!VCeu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0208ffc-d627-4023-a75a-906e91618770_2600x1584.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Quick aside, I thought this string concatenation behavior was quite interesting.</p><p>Instead of writing the suspicious string outright (<code>"Excel.Application"</code>), the attacker breaks it into smaller fragments:</p><pre><code><code>tmpString = "Exc"
tmpString = tmpString &amp; "el.App"
tmpString = tmpString &amp; "lication"</code></code></pre><p>Then, at runtime, those fragments are concatenated into the full string:<br><code>Excel.Application</code></p><p>That reconstructed string is then passed into <code>CreateObject()</code> to instantiate Excel via COM automation.</p><p><em>Why would an attack do all this?</em></p><p><strong>Signature Evasion: </strong>Static scanners will often look for explicit strings like <code>"Excel.Application"</code>, <code>"Wscript.Shell"</code>, or <code>"MSXML2.XMLHTTP"</code>. Breaking them up prevents easy pattern-matching.</p><p><strong>Analyst Friction: </strong>For someone casually inspecting the script, it appears more confusing, and you need to reassemble the pieces mentally.</p><p><strong>Commodity Obfuscation: </strong>This technique is cheap and easy to implement. You often see it in phishing droppers, VBA/VBS loaders, and even JavaScript malware.</p><p><strong>Victim Susceptibility</strong>: This technique bypasses the traditional &#8220;open this malicious document&#8221; step, which a suspecting victim will be privy to.</p><p><a href="https://redcanary.com/threat-detection-report/techniques/obfuscated-files-information/#:~:text=String%20concatenation%20is%20another%20common,based%20detective%20and%20preventive%20controls.">Red Canary has a nicely written blog on this behavior</a>.</p><div><hr></div><h2>Phase 5: The VBA Reflective Loader</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mXUr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mXUr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png 424w, https://substackcdn.com/image/fetch/$s_!mXUr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png 848w, https://substackcdn.com/image/fetch/$s_!mXUr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png 1272w, https://substackcdn.com/image/fetch/$s_!mXUr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mXUr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png" width="1456" height="849" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:849,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:278908,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mXUr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png 424w, https://substackcdn.com/image/fetch/$s_!mXUr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png 848w, https://substackcdn.com/image/fetch/$s_!mXUr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png 1272w, https://substackcdn.com/image/fetch/$s_!mXUr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd37465f-5e11-47f6-8feb-e9a6135c5980_1506x878.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://attack.mitre.org/techniques/T1620/">Source</a>:</strong> T1620</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0D0U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0D0U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png 424w, https://substackcdn.com/image/fetch/$s_!0D0U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png 848w, https://substackcdn.com/image/fetch/$s_!0D0U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png 1272w, https://substackcdn.com/image/fetch/$s_!0D0U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0D0U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png" width="1456" height="975" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:975,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:345239,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0D0U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png 424w, https://substackcdn.com/image/fetch/$s_!0D0U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png 848w, https://substackcdn.com/image/fetch/$s_!0D0U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png 1272w, https://substackcdn.com/image/fetch/$s_!0D0U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ed2e3c7-b98d-4eab-b870-bf87ea1ef754_1506x1008.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://attack.mitre.org/techniques/T1027/011/">Source</a>: </strong>T1027.011</p><p>Once injected, the macro acted like a <strong>reflective shellcode loader</strong>. </p><p>Instead of dropping a file to disk, it:</p><ul><li><p>Converted encoded Base64 payload strings back into executable code.</p></li><li><p>Used indirect API calls (<code>DispCallFunc</code>) to resolve Windows functions dynamically, avoiding static detection.</p><ul><li><p><a href="https://learn.microsoft.com/en-us/windows/win32/api/oleauto/nf-oleauto-dispcallfunc">More about DispCallFunc</a>.</p></li></ul></li><li><p>Reserved RWX (Read-Write-Execute) memory (<code>VirtualAlloc</code>), copied shellcode into it (<code>RtlMoveMemory</code>), and executed it with <code>CreateThread</code>.</p><ul><li><p><a href="https://learn.microsoft.com/en-us/windows/win32/api/memoryapi/nf-memoryapi-virtualalloc">More about VirtualAlloc</a>.</p></li><li><p><a href="https://learn.microsoft.com/en-us/windows/win32/devnotes/rtlmovememory">More about RtlMoveMemory</a>.</p></li></ul></li></ul><p>&#128248; <em>[Screenshot: Any.Run view &#8211; Excel.exe outbound connection]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LjeU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LjeU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png 424w, https://substackcdn.com/image/fetch/$s_!LjeU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png 848w, https://substackcdn.com/image/fetch/$s_!LjeU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png 1272w, https://substackcdn.com/image/fetch/$s_!LjeU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LjeU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png" width="1456" height="1049" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1049,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:643025,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LjeU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png 424w, https://substackcdn.com/image/fetch/$s_!LjeU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png 848w, https://substackcdn.com/image/fetch/$s_!LjeU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png 1272w, https://substackcdn.com/image/fetch/$s_!LjeU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2455a9dd-544f-4175-98fa-802d7173cd09_2302x1658.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is the same type of technique often employed in advanced malware &amp; C2 frameworks, such as <strong>Cobalt Strike</strong>. </p><p>The difference here is that it was part of a phishing campaign targeting YouTube creators, which illustrates how attacker tradecraft once exclusive to nation-states or red-team operations is now appearing in common campaigns.</p><p>The macro reached out to:</p><ul><li><p><code>hxxps://policy-agreement[.]com/agrees.bin</code> (x86 payload)</p></li><li><p><code>hxxps://policy-agreement[.]com/agreese.bin</code> (x64 payload)</p></li></ul><p>Both were delivered over HTTPS, with certificate errors ignored &#8212; another way of blending into normal traffic.</p><blockquote><p>It&#8217;s crazy that this binary never touched disk. It lived entirely in memory.</p></blockquote><p><a href="https://www.hack-notes.pro/maldev/reflective-loader">Some cool notes on reflective loaders</a>.</p><div><hr></div><h2>Phase 6: Command and Control</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZuEA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZuEA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png 424w, https://substackcdn.com/image/fetch/$s_!ZuEA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png 848w, https://substackcdn.com/image/fetch/$s_!ZuEA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png 1272w, https://substackcdn.com/image/fetch/$s_!ZuEA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZuEA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png" width="1456" height="670" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:670,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:164386,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZuEA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png 424w, https://substackcdn.com/image/fetch/$s_!ZuEA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png 848w, https://substackcdn.com/image/fetch/$s_!ZuEA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png 1272w, https://substackcdn.com/image/fetch/$s_!ZuEA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b133046-baeb-4b52-9b72-9b8b603d3a0d_1490x686.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://attack.mitre.org/tactics/TA0011/">Source</a>: </strong>TA0011<strong> </strong></p><p>Excel itself acted as the beacon, the communication channel.</p><ul><li><p><strong>C2 domain:</strong> <code>policy-agreement[.]com</code></p></li><li><p><strong>Protocol:</strong> HTTPS (but with bad certificates silently bypassed)</p></li><li><p><strong>User-Agent:</strong> An outdated Internet Explorer string (<code>Mozilla/4.0; MSIE 6.0; Windows NT 5.0</code>). This can help evade modern detection rules that expect current browser signatures.</p></li><li><p><strong>Infrastructure:</strong> Cloudflare-protected, backend IP in Amsterdam (RIPE NCC allocation).</p></li></ul><p>&#128248; <em>[Screenshot: Excel.exe using legacy UserAgent]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GrvY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GrvY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png 424w, https://substackcdn.com/image/fetch/$s_!GrvY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png 848w, https://substackcdn.com/image/fetch/$s_!GrvY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png 1272w, https://substackcdn.com/image/fetch/$s_!GrvY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GrvY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png" width="1456" height="1049" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1049,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:623014,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/172138516?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GrvY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png 424w, https://substackcdn.com/image/fetch/$s_!GrvY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png 848w, https://substackcdn.com/image/fetch/$s_!GrvY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png 1272w, https://substackcdn.com/image/fetch/$s_!GrvY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c940d40-f2e9-47a3-8e55-4a12172618da_2302x1658.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,500 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h2>Attribution Notes</h2><p>I am <strong>not assigning this campaign to a named actor</strong>. </p><p>The evidence suggests a&nbsp;<strong>commodity crimeware operation</strong>&nbsp;or an&nbsp;<strong>affiliate-driven ecosystem,</strong> rather than a bespoke, state-sponsored group (bummer).</p><p>Several factors inform this assessment:</p><ul><li><p><strong>Targeting:</strong> &#8220;YouTube appeal&#8221; lures are a well-worn tactic in campaigns designed to hijack creator accounts for monetization (ad fraud, crypto scams, or resale). This is not new at all.</p></li><li><p><strong>Tradecraft reuse:</strong> The clipboard &#8594; Win+R &#8594; <code>mshta.exe</code> pattern, HTA/VBScript loader, and reflective VBA macro are drawn from widely circulated public code. Even the outdated Internet Explorer User-Agent hints at template reuse rather than original development.</p></li><li><p><strong>Infrastructure:</strong> The use of Cloudflare-fronted domains like <code>policy-agreement[.]com</code> with generic naming and shared backend IPs is consistent with low-cost, low-OPSEC phishing kits that frequently rotate their infrastructure.</p></li><li><p><strong>Execution:</strong> While reflective loading and fileless execution look &#8220;advanced,&#8221; these have become standardized in the malware-as-a-service space and don&#8217;t necessarily indicate a high-skill actor.</p></li></ul><p>What&#8217;s missing for higher-confidence attribution are overlaps in infrastructure (domain clusters, cert reuse), payload families, or development artifacts. </p><p>Given the current depth of my analysis, my most accurate framing is <strong>a financially motivated loader campaign leveraging commodity techniques against YouTube creators.</strong></p><div><hr></div><h1>Defense Mechanisms</h1><p>This campaign leaves behind multiple breadcrumbs across host, network, and memory. Below are hunting opportunities mapped to <strong>MITRE ATT&amp;CK TTPs</strong>, with practical angles defenders can pursue.</p><h3><strong>Process &amp; Execution Hunts</strong></h3><ul><li><p><code>mshta.exe</code><strong> launching Excel</strong></p><ul><li><p><strong>ATT&amp;CK:</strong> T1218.005 - Signed Binary Proxy Execution: MSHTA</p></li><li><p><strong>Hunt idea:</strong> Query EDR/Sysmon logs for <code>mshta.exe</code> spawning <code>excel.exe</code> (rare, highly suspicious).</p></li><li><p>Example:</p><ul><li><p>Sysmon Event ID 1 (ProcessCreate)</p></li><li><p><code>ParentImage: mshta.exe</code> + <code>Image: excel.exe</code></p></li></ul></li></ul></li><li><p><strong>Excel spawning unusual child processes</strong></p><ul><li><p><strong>ATT&amp;CK:</strong> T1106 - Native API; T1105 &#8211; Ingress Tool Transfer</p></li><li><p>Hunt for <code>excel.exe</code> with outbound network activity or process injection behaviors (should be nearly nonexistent in normal use).</p></li></ul></li></ul><h3><strong>Registry Hunts</strong></h3><ul><li><p><strong>Modification of AccessVBOM key</strong></p><ul><li><p><code>HKCU\Software\Microsoft\Office\&lt;ver&gt;\Excel\Security\AccessVBOM</code></p></li><li><p><strong>ATT&amp;CK:</strong> T1112 - Modify Registry</p></li><li><p>Hunt for registry changes that enable VBOM access, especially those followed by Excel activity.</p></li><li><p>Sysmon Event ID 13 (RegistryEvent) with <code>TargetObject: *\AccessVBOM</code></p></li></ul></li></ul><h3><strong>Network Hunts</strong></h3><ul><li><p><strong>Excel initiating HTTPS connections</strong></p><ul><li><p><strong>ATT&amp;CK:</strong> T1071.001 - Application Layer Protocol: Web (HTTPS)</p></li><li><p>Hunt for unusual parent process (<code>excel.exe</code>) establishing TLS sessions.</p></li><li><p>Alert on legacy User-Agent strings (<code>Mozilla/4.0; MSIE 6.0; Windows NT 5.0</code>) in proxy logs.</p></li></ul></li><li><p><strong>Connections to suspicious domains behind Cloudflare</strong></p><ul><li><p><strong>ATT&amp;CK:</strong> T1102 - Web Service; T1105 - Ingress Tool Transfer</p></li><li><p>Focus on domains recently registered, mismatched TLS certs, or with patterns mimicking legitimate services (<code>policy-agreement[.]com</code>, <code>youtube.strike.alert[.]org</code>).</p></li></ul></li></ul><h3><strong>Memory / API Call Hunts</strong></h3><ul><li><p><strong>Excel performing reflective code loading</strong></p><ul><li><p><strong>ATT&amp;CK:</strong> T1620 - Reflective Code Loading</p></li><li><p>Look for Office processes calling <code>VirtualAlloc</code>, <code>RtlMoveMemory</code>, and <code>CreateThread</code>.</p></li><li><p><a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/devtest/event-tracing-for-windows--etw-">ETW</a> or EDR telemetry can reveal these unusual API sequences.</p></li></ul></li></ul><h3><strong>Clipboard / User Interaction Hunts</strong></h3><ul><li><p><strong>Clipboard injection leading to Win+R execution</strong></p><ul><li><p><strong>ATT&amp;CK:</strong> T1056.001 - Input Capture: Clipboard Data</p></li><li><p>Hunt for patterns of auto-pasted <code>mshta.exe</code> commands in user activity logs.</p></li><li><p>Harder to detect, but can be spotted in forensic investigations.</p></li></ul></li></ul><h2>Defensive Controls to Prioritize</h2><ul><li><p>Restrict or disable <code>mshta.exe</code> (AppLocker / WDAC).</p></li><li><p>Enable Microsoft <a href="https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction">ASR</a> rules:</p><ul><li><p><em>Block Office applications from creating child processes</em></p></li><li><p><em>Block Win32 API calls from Office macros</em></p></li></ul></li><li><p>Harden macro execution policies; disable programmatic access to VBOM.</p></li><li><p>Add proxy/firewall detections for Excel/Office Apps outbound HTTPS traffic.</p></li></ul><div><hr></div><h1>Indicators of Compromise (IoCs)</h1><p><strong>IPs</strong></p><ul><li><p>188.114.96.3</p></li><li><p>185.158.133.1</p></li></ul><p><strong>Domains</strong></p><ul><li><p><code>policy[.]video</code></p></li><li><p><code>youtube.strike.alert[.]org</code></p></li><li><p><code>policy-agreement[.]com</code></p></li></ul><p><strong>Files</strong></p><ul><li><p><code>DMCA_notice.hta</code></p></li><li><p><code>agrees.bin</code></p></li><li><p><code>agreese.bin</code></p></li></ul><p><strong>Hashes</strong></p><ul><li><p>af32902cf27ffe3d4c1de4cf889edb0ed4ecae0f910ab47a2a0188be08b39f83</p></li></ul><p><strong>Registry</strong></p><ul><li><p><code>HKCU\Software\Microsoft\Office\&lt;ver&gt;\Excel\Security\AccessVBOM</code></p></li></ul><p><strong>Processes</strong></p><ul><li><p><code>mshta.exe</code> launching HTA &#8594; Excel.exe network activity</p></li></ul><div><hr></div><h1>Detection Opportunities</h1><p><strong>Host-Based:</strong></p><ul><li><p>Monitor for <code>mshta.exe</code> spawning Office processes.</p></li><li><p>Alert on AccessVBOM registry changes.</p></li><li><p>Hunt for RWX memory allocations in Excel (or other office apps).</p></li></ul><p><strong>Network-Based:</strong></p><ul><li><p>Excel initiating HTTPS sessions.</p></li><li><p>Legacy User-Agent strings.</p></li><li><p>C2 domains behind Cloudflare with ignored TLS validation.</p></li></ul><p><strong>Prevention:</strong></p><ul><li><p>Restrict/block MSHTA in enterprise environments (as needed).</p></li><li><p>Enforce Office <a href="https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference">ASR</a> rules (&#8220;block child processes,&#8221; &#8220;block API calls from macros&#8221;).</p></li><li><p>Disable programmatic VBOM access via GPO.</p></li></ul><div><hr></div><h1>Conclusion</h1><p>What happened to me is part of a larger trend showing that phishing is no longer just an email with bad grammar. It&#8217;s now:</p><ul><li><p><strong>Blended trust abuse</strong>: Cloud services + legitimate binaries.</p></li><li><p><strong>Multi-stage loaders</strong>: HTA &#8594; VBScript &#8594; Excel &#8594; reflective shellcode.</p></li><li><p><strong>Defense evasion</strong>: fileless, memory-resident, TLS-encrypted C2.</p></li></ul><p>For newer defenders, the lesson is not to underestimate a &#8220;simple phish.&#8221; </p><p>For seasoned analysts, this campaign demonstrates how low-cost adversaries are now borrowing tradecraft once considered &#8220;sophisticated.&#8221;</p><p>This incident serves as a reminder that attackers don&#8217;t have to invent new methods constantly. They simply adapt existing, proven techniques in ways that defenders might overlook.</p><div><hr></div><h2>Closing Note</h2><p>Thank you for reading!</p><p>This is my <strong>first full analysis-style newsletter,</strong> as most of my writing here has been reflective or career-focused. However, this time I wanted to share what it looks like when I sit down and work through a real-world attack in detail.</p><p>This kind of analysis is something I plan to do more often, blending <strong>storytelling, threat intelligence, and detection engineering</strong> into reports that are useful to both students and seasoned professionals.</p><p>Your feedback means a great deal as I develop this format. If you found this valuable, please share it with someone in your network who would also benefit from it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Power Of Cyber Threat Intelligence]]></title><description><![CDATA[Turning Raw Indicators Into Threat Intelligence with ANY.RUN.]]></description><link>https://www.cyberwoxunplugged.com/p/the-power-of-cyber-threat-intelligence</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/the-power-of-cyber-threat-intelligence</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Wed, 27 Aug 2025 12:46:38 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/171532050/2163c4ea3713ee8f7021c0c8b5b0c9c5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Conflict today doesn&#8217;t just play out on land, sea, or in the air. It&#8217;s expanded into cyberspace. </p><p>Behind every headline of breaches and takedowns are targeted campaigns carried out by methodical, well-resourced threat actors &#8212; each with their motives, tactics, and long-term goals.</p><p>One such group is <strong>Salt Typhoon</strong> (also tracked as <em>FamousSparrow</em> and <em>GhostEmperor</em> depending on the vendor). </p><p>A Chinese nation-state&#8211;backed adversary that has been discovered infiltrating major U.S. telecom networks &#8212; from T-Mobile to Verizon, Samsung, and others.</p><p>Salt Typhoon is known for stealth, patience, and precision. </p><p>They leave behind only faint traces across compromised networks, making it exceptionally difficult for defenders to contain or eradicate their activity.</p><p>That challenge is exactly where <strong>cyber threat intelligence (CTI)</strong> comes in.</p><div><hr></div><h2>From IOCs to Insight</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Axx3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Axx3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Axx3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Axx3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Axx3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Axx3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!Axx3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Axx3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Axx3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Axx3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47df7173-4df3-4c3d-9309-361ec161e956_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Threat intelligence is not just about collecting IOCs (indicators of compromise, such as hashes, IPs, and domains) and feeding them into SIEMs. </p><p>At its best, CTI is about <strong>connecting the dots</strong>: finding patterns across disparate indicators, uncovering infrastructure, profiling adversary behavior, and turning raw data into actionable defense.</p><p>The value lies in the transformation:</p><ul><li><p>From a file hash &#8594; to the malware family behind it.</p></li><li><p>From a suspicious domain &#8594; to the broader C2 network.</p></li><li><p>From isolated alerts &#8594; to an adversary campaign strategy.</p></li></ul><p>When done well, this enables defenders to build more effective detections, strengthen playbooks, automate enrichment, and prioritize risks in line with evolving active threat landscapes.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from various SOC analyst roles, investigating everything from endpoint threats to building detection systems for cloud-based abuse, so I know exactly what it takes to break into this field and make career advancements.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,500 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h2>Applying CTI in Practice</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zraM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zraM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!zraM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!zraM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!zraM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zraM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!zraM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!zraM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!zraM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!zraM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a3f83f-688c-453c-bf11-bac3b7c8a0a2_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As a Security Engineer at Amazon, I&#8217;ve had the opportunity to use threat intelligence at scale. </p><p>But CTI isn&#8217;t just for enterprise SOCs. With the right tools, individual analysts and researchers can explore and learn from the same adversary tradecraft.</p><p>For this issue, I investigated <strong>Salt Typhoon</strong> using ANY.RUN&#8217;s Threat Intelligence Platform. It blends <strong>interactive sandboxing</strong> (their signature strength) with curated intelligence and lookup capabilities. Here&#8217;s what that looks like in practice:</p><ul><li><p><strong>Starting with a handful of IOCs</strong>, such as an IP address, a SHA-256 hash, or a domain name.</p></li><li><p><strong>Pivoting into reports</strong> &#8594; correlating with published research from vendors like Trend Micro.</p></li><li><p><strong>Interactive detonation</strong> &#8594; running suspicious files in a sandbox, observing process creation, persistence mechanisms, and outbound C2 calls.</p></li><li><p><strong>Hunting for connections</strong> &#8594; mapping behaviors against known TTPs and extracting new indicators.</p></li><li><p><strong>YARA integration</strong> &#8594; building and running rules directly in the platform to surface related artifacts.</p></li></ul><p>What begins as a single suspicious hash quickly expands into a narrative: a Trojan is dropped, a service is created for persistence, reconnaissance of the host is conducted, and finally, communication with a C2 domain occurs.</p><div><hr></div><h2>Why It Matters</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FWa0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FWa0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!FWa0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!FWa0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!FWa0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FWa0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!FWa0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!FWa0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!FWa0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!FWa0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f9f759f-63b3-4fd4-997e-584e9f0f3b09_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The power of CTI lies in turning <strong>fragments into a story</strong>. </p><p>Instead of drowning in endless IOCs, analysts can contextualize activity, link it to known actors, and anticipate what might come next.</p><p>In this case, a few scattered data points around Salt Typhoon transformed into a clearer picture of:</p><ul><li><p>Their infrastructure choices</p></li><li><p>Their persistence techniques</p></li><li><p>Their reconnaissance behavior</p></li><li><p>Their communication patterns</p></li></ul><p>With that knowledge, defenders can proactively hunt for related TTPs in their environments or simulate adversary behavior to test defenses.</p><div class="pullquote"><p><em><strong>ANY.RUN Threat Intelligence</strong></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QHnK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QHnK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 424w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 848w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1272w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png" width="1456" height="455" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/caf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:455,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:22296,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!QHnK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 424w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 848w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1272w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This issue is powered by ANY.RUN, which sponsored this deep dive. ANY.RUN makes it easy to turn raw indicators into actionable intelligence without needing to set up your own lab environment. If you&#8217;re serious about developing threat intelligence skills, it&#8217;s worth checking out.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://bit.ly/cwx-anyrun-threat-intelligence-lookup&quot;,&quot;text&quot;:&quot;&#128640;Unlock (free) ANY.RUN Threat Intel&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://bit.ly/cwx-anyrun-threat-intelligence-lookup"><span>&#128640;Unlock (free) ANY.RUN Threat Intel</span></a></p></div><h1>Closing</h1><p>What began as a file hash and a suspicious domain evolved into a broader narrative about Salt Typhoon&#8217;s operations. That&#8217;s the heart of cyber threat intelligence: transforming raw signals into stories that defenders can act on.</p><p>If you&#8217;re early in your cybersecurity journey, practice this workflow yourself:</p><ul><li><p>Begin with a known IOC from a publicly available report.</p></li><li><p>Pivot into related domains, files, and hashes.</p></li><li><p>Map the TTPs you discover against frameworks like MITRE ATT&amp;CK.</p></li><li><p>Build detections or run hunts based on your findings.</p></li></ul><p>That&#8217;s how you transition from merely &#8220;consuming&#8221; intel to&nbsp;<strong>generating actionable intelligence</strong>&nbsp;&#8212; a skill that grows from home labs to Fortune 500 SOCs.</p><p>Here&#8217;s a video that can help you do that:</p><div id="youtube2-A0r6A7kWD58" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;A0r6A7kWD58&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/A0r6A7kWD58?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><p>Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/the-power-of-cyber-threat-intelligence?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/the-power-of-cyber-threat-intelligence?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Do You Really Need the CompTIA A+ to Get Into Cybersecurity?]]></title><description><![CDATA[A personal reflection on why the CompTIA A+ can help but won&#8217;t define your cybersecurity career.]]></description><link>https://www.cyberwoxunplugged.com/p/do-you-really-need-the-comptia-a</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/do-you-really-need-the-comptia-a</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 25 Aug 2025 12:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jq_S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;re trying to break into cybersecurity, especially if you&#8217;re entirely new to the field, one of the first questions you&#8217;ve probably asked is: <em>Do I need the CompTIA A+?</em></p><p>I&#8217;ve been on both sides of this. </p><p>I failed the A+ twice, came back and passed, and even went on to complete the full CompTIA &#8220;trifecta&#8221; (A+, Network+, Security+). </p><p>Along the way, I discovered both the value <em>and</em> the limits of CompTIA A+ in a cybersecurity career.</p><p>Here&#8217;s my honest opinion based on my experience, not just what I read online.</p><div><hr></div><h1><strong>My Perspective</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NLbQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NLbQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!NLbQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When I first set out, I didn&#8217;t have any IT background. </p><p>No jobs, no internships, no professional experience. Just a freshman in college who was &#8220;tech savvy&#8221; but honestly had significant gaps in knowledge.</p><p>That&#8217;s where the <strong>CompTIA</strong> <strong>A+ became foundational</strong> for me. </p><p>It taught me the basics of hardware, software troubleshooting, virtualization, networking, and even a bit of security. </p><p>It gave me the vocabulary and confidence to start talking about IT in interviews and internships.</p><p>So yes, <strong>the CompTIA A+ was valuable as a learning tool</strong>. </p><p>It laid the groundwork for everything else: Network+, Security+, internships, and eventually, the career I have now.</p><div><hr></div><h1><strong>Counterarguments (And Why They&#8217;re True Too)</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6lzR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6lzR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6lzR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!6lzR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s the reality:</p><ul><li><p><strong>You don&#8217;t </strong><em><strong>need</strong></em><strong> the CompTIA A+ to work in cybersecurity.</strong> Employers aren&#8217;t hiring security analysts because of an A+ certification. It won&#8217;t get your resume fast-tracked for a SOC, incident response, or any cybersecurity role.</p></li><li><p>Even for IT help desk jobs, the CompTIA A+ is <strong>less recognized now</strong> than it was a decade ago. Many employers don&#8217;t care about it at all.</p></li><li><p>If you&#8217;re already technical &#8212; maybe you&#8217;ve been tinkering with computers for years, are a hobbyist home labber, or you studied CS/IT  in school &#8212; the A+ will feel redundant. You could skip it and jump straight into Security+ or a cloud cert.</p></li></ul><p>So while it gave me the foundation I needed, I also tell people: <strong>don&#8217;t treat it as a mandatory step.</strong></p><div><hr></div><h2><strong>About Me</strong></h2><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from SOC analyst roles, investigating everything from endpoint threats to cloud-based abuse, so I know exactly what it takes to break into this field.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>I was able to break into cybersecurity as early as my freshman year of college. I&#8217;ve secured several jobs and interviews before earning my college degree, and I&#8217;ve helped thousands of people achieve the same success on my various content channels and in my Discord Community.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,500 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><div><hr></div><h1><strong>My Advice</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jq_S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jq_S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jq_S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!jq_S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s what I&#8217;d recommend, based on living this journey myself:</p><ol><li><p><strong>Evaluate Your Starting Point.</strong></p><ul><li><p>If you&#8217;re brand new, non-technical, or lack confidence with computers, the A+ (or at least studying its materials) is a great launchpad.</p></li><li><p>If you already know how systems, networks, and troubleshooting work, skip it and go deeper.</p></li></ul></li><li><p><strong>Study the Materials Even If You Skip the Exam.</strong></p><ul><li><p>The objectives cover core IT fundamentals every cybersecurity pro should understand.</p></li><li><p>Read through them, watch Professor Messer, check Jason Dion&#8217;s practice tests &#8212; even if you don&#8217;t sit for the test, you&#8217;ll get the knowledge.</p></li></ul></li><li><p><strong>Don&#8217;t Let Certifications Define You.</strong></p><ul><li><p>I failed the A+ twice. What made the difference wasn&#8217;t a piece of paper &#8212; it was how I learned from failure, changed my study approach, and built discipline.</p></li><li><p>In interviews, my A+ alone didn&#8217;t land me internships. Selling myself, showing curiosity, and demonstrating what I learned mattered more than the cert itself.</p></li></ul></li><li><p><strong>Use A+ as a Stepping Stone.</strong></p><ul><li><p>If you do take it, use it as a bridge to Network+ and Security+. Networking, especially, will pay dividends in security analysis and investigations.</p></li></ul></li></ol><div><hr></div><h1><strong>Personal Experiences That Shaped My View</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H6Iy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H6Iy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!H6Iy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Failure is a Turning Point</strong></h3><p>My first attempts were a mess. </p><p>Studied for both Core 1 &amp; Core 2 at the same time. Used Cisco IT Essentials instead of the actual CompTIA A+ materials. Failed twice, right before my birthday. </p><p>I wanted to quit &#8212; but my dad encouraged me to try again. That encouragement was the catalyst for everything that came next.</p><h3><strong>The Power of Fundamentals</strong></h3><p>At my internship, I once had to analyze an IP address connection during an investigation. It clicked for me that without the networking fundamentals I picked up through A+ and later Network+, I would&#8217;ve struggled.</p><h3><strong>Not Just the Cert, But the Confidence</strong></h3><p>Even when employers didn&#8217;t care about my CompTIA A+, I cared. Because I knew I could hold my own in technical conversations, and that confidence carried me into bigger opportunities.</p><div><hr></div><h1><strong>Closing Reflection</strong></h1><p>So, do you need the CompTIA A+ to get into cybersecurity?</p><p><strong>No.</strong><br>But for the right person &#8212; especially if you&#8217;re brand new, uncertain, or starting from zero &#8212; it can be a powerful foundation.</p><p>The CompTIA A+ won&#8217;t define your career. What will define it is your willingness to learn, to adapt, to fail forward, and to keep going.</p><p>Because in this field, the certs don&#8217;t make you.<br>The journey does.</p><p>Stay tuned.</p><div><hr></div><h1>Cyberwox Resources on the CompTIA A+</h1><div id="youtube2-JUy3g_l_Wu0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;JUy3g_l_Wu0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/JUy3g_l_Wu0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-l4taKWNnHHQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;l4taKWNnHHQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/l4taKWNnHHQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-LukCgEWu5I8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;LukCgEWu5I8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/LukCgEWu5I8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-IJrVyo1N724" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;IJrVyo1N724&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/IJrVyo1N724?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>&#128161; <strong>A Note of Gratitude</strong></h3><p>Before I sign off, a huge thank you to all of you who support <em>CYBERWOX Unplugged</em> as paid subscribers. You make it possible for me to keep creating honest, reflective content like this, rooted in my own journey. </p><p>I don&#8217;t take that support for granted.</p><p>If you&#8217;re still on the fence, consider joining. It helps sustain the work and gives you access to deeper subscriber-only posts, resources, and behind-the-scenes reflections.</p><p>This is just the beginning.</p><div><hr></div><p>Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/do-you-really-need-the-comptia-a?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/do-you-really-need-the-comptia-a?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Why I’m Building a New Cybersecurity Homelab ]]></title><description><![CDATA[Five Years Later!]]></description><link>https://www.cyberwoxunplugged.com/p/why-im-building-a-new-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/why-im-building-a-new-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 22 Aug 2025 12:03:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f1ae16ec-e503-41e5-8bd3-4ce65b325387_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Five years ago, I was just a curious college freshman with a few spare computer parts, a lot of Google searches, and a dream of breaking into cybersecurity. </p><p>That spark led me to build my very first homelab in a small apartment bedroom. No mentors, no structured guidance, just curiosity and trial-and-error.</p><p>That project changed everything. It was the first time I saw what was really happening under the hood: how hosts behaved, how networks communicated, how virtual machines could mimic production environments. </p><p>My entire career in incident response, detection engineering, threat hunting, and cloud security traces back to that moment.</p><p>Now, half a decade later, I&#8217;m starting over.</p><p>But this time, I&#8217;m building with real-world experience behind me, more intention, and a vision.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o68v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o68v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o68v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o68v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o68v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o68v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg" width="768" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:164497,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/171047974?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o68v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o68v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o68v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o68v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3dfae1c-aa15-4dcf-a471-030775b06714_768x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Dec 2020 &#8594; 18-year-old me - working as a Cybersecurity Intern &amp; full-time college sophomore at the time.</em></p><div><hr></div><h1>Why Start Over?</h1><p>The first lab was raw curiosity. </p><p>Plugging things together, watching packets fly, and trying to make sense of it all.</p><p>That&#8217;s exactly what I needed at the time. But I&#8217;ve grown. I&#8217;m no longer the kid trying to figure out what a SIEM even is. I&#8217;m a security engineer at Amazon who&#8217;s lived in the trenches of incident response, adversary detection, and cloud security.</p><p>And with that growth comes new questions:</p><ul><li><p><em>How can I push my homelab into its next evolution?</em></p></li><li><p><em>How can I design my homelab to build and test the new skills I want to develop at this stage of my career?</em></p></li><li><p><em>How can my new homelab help me learn new skills?</em></p></li></ul><p>This time, the goal is not just tinkering. I&#8217;m designing a <strong>home Security Operations Center (SOC)</strong> where I can experiment, prototype, and learn new skills in public.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1zYc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1zYc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1zYc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1zYc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1zYc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1zYc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg" width="768" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:190974,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/171047974?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1zYc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1zYc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1zYc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1zYc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40728e3d-7e23-43da-bbca-767c91ca6ff7_768x1024.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Jan 2021 &#8594; For a while, I thought I was going to become a network (security) engineer, so here I am in 2021, diving into network security for Cisco routers and switches. Spoiler: I did not become a network security engineer.</em></p><div><hr></div><h2><strong>About Me</strong></h2><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from SOC analyst roles, investigating everything from endpoint threats to cloud-based abuse, so I know exactly what it takes to break into this field.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>I was able to break into cybersecurity as early as my freshman year of college. I&#8217;ve secured several jobs and interviews before earning my college degree, and I&#8217;ve helped thousands of people achieve the same success on my various content channels and in my Discord Community.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,500 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>The New Blueprint</h1><p>Here&#8217;s where I&#8217;m starting:</p><ul><li><p><strong>The Hardware:</strong> I&#8217;m converting an old PC into a <strong>Type-1 hypervisor</strong> (bare-metal virtualization). No middleman OS, just pure performance and control.</p></li><li><p><strong>The Core Platform:</strong> Running <strong>Proxmox</strong> for virtualization. I&#8217;m also planning to explore diving deeper into mini-data center operations by leveraging Proxmox&#8217;s clustering functionality.</p></li><li><p><strong>The SOC Engine:</strong> <strong>Wazuh</strong> at the center, doubling as both my SIEM and XDR platform. This also helps me leverage a unified platform that I can plug external integrations into for experiments.</p></li><li><p><strong>Visibility Everywhere:</strong> Rolling out agents to every endpoint I can&#8212;Windows, macOS, IoT devices, even &#8220;smart&#8221; tech around the house. If it talks to the internet, I want visibility.</p></li><li><p><strong>Additional Tools:</strong> Still deciding, but possibilities include Limacharlie for EDR testing, Pfsense for firewall, and maybe some local Container tools that I may use for experimenting with Falco. Wazuh itself has active response, so I&#8217;ll be balancing native vs. add-on capabilities.</p></li><li><p><strong>AI in the SOC:</strong> Beyond buzzwords, I&#8217;ll experiment with using LLMs for anomaly detection, automation, and more intelligent triage workflows. I&#8217;ll also be playing around with MCP integrations to see what that yields.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cVF3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cVF3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cVF3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cVF3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cVF3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cVF3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:138348,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/171047974?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cVF3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cVF3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cVF3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cVF3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecdb48b1-8e00-4665-b998-d7b14230eb8e_1024x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>March 2021 &#8594; the evolution of my &#8220;lab&#8221;. It honestly was just the addition of an excessive 49&#8221; ultrawide screen and stacked monitor setup. </em></p><div><hr></div><h1>Lessons in Frustration (and Growth)</h1><p>One thing hasn&#8217;t changed since my first homelab: trial and error is the name of the game.</p><p>Getting Proxmox running on bare metal was a headache. </p><p>I went through HDMI swaps, capture card experiments, BIOS tweaks, and kernel parameter hacks before things finally booted correctly. </p><p>At one point, it felt like I&#8217;d broken the host. </p><p><em>Spoiler: I hadn&#8217;t. It just required persistence.</em></p><p>Moments like that reminded me why homelabs matter so much. They expose the <em>rust</em> in your technical chops. </p><p>They force you to fail, to troubleshoot, and to learn. And I&#8217;ve found that to be the best preparation for real-world security work.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DoMX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DoMX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DoMX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DoMX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DoMX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DoMX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:220716,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/171047974?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DoMX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DoMX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DoMX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DoMX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F195f4a3c-b4b6-4413-99f5-44db4825b0fc_1024x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>May 2021 &#8594; I spent a lot of time learning about Splunk within my homelab, and it paid a lot of dividends over the ongoing course of my career (till this day).</em></p><div><hr></div><h1>Why It Matters. Why Now?</h1><p>This lab isn&#8217;t about showing off gear (tbh the gear is old) or building the &#8220;perfect&#8221; setup. It&#8217;s about my desire to create a <strong>sandbox for growth</strong>:</p><ul><li><p>For me, it&#8217;s a way to stay sharp outside of work, to play with tools in ways I can&#8217;t in enterprise environments.</p></li><li><p>For the community, it&#8217;s proof that learning never stops. I&#8217;ll be sharing my process openly, mistakes and all, so that others can build their own versions.</p></li><li><p>For the industry, it&#8217;s a reminder that innovation often starts at home, with curiosity and persistence.</p></li></ul><p>Five years ago, my first homelab helped me land interviews, build skills, and eventually start my career. </p><p>Who knows what this next one will spark?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K4PV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K4PV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg 424w, https://substackcdn.com/image/fetch/$s_!K4PV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg 848w, https://substackcdn.com/image/fetch/$s_!K4PV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!K4PV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K4PV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg" width="1170" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1170,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:673769,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/171047974?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K4PV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg 424w, https://substackcdn.com/image/fetch/$s_!K4PV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg 848w, https://substackcdn.com/image/fetch/$s_!K4PV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!K4PV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3998f0-9424-453f-8398-82cf2271cf6b_1170x608.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>January 2022 &#8594; New Apartment with separate setups for work and study/labbing. This is actually me taking the Security Blue Team BTL1 certification!</em> </p><div><hr></div><h1>What&#8217;s Next</h1><p>This was just <strong>Step 1: Laying the foundation.</strong></p><p>Next, I&#8217;ll be deploying Wazuh on Proxmox, configuring my SIEM/XDR stack, and rolling out agents across every machine in my house. </p><p>From there, I&#8217;ll test detection engineering workflows, automation, and maybe even play with AI-assisted incident response.</p><p>If something in my home misbehaves, I want to catch it.<br>If it breaks, I want to know why.<br>And if it teaches me something new, I want to share that with you.</p><p>The journey continues.</p><p>Stay tuned.</p><div><hr></div><h3>&#128161; <strong>A Note of Gratitude</strong></h3><p>This issue of Cyberwox Unplugged is my very first <em>paid</em> post. </p><p>That means you&#8217;re not just reading my reflections&#8212;you&#8217;re directly supporting the growth of this publication and my mission to build practical, real-world cybersecurity content. </p><p>Thank you for being here and investing in the journey with me. </p><p>This is just the beginning.</p><div><hr></div><p>Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzU1NzQ1OTkyLCJleHAiOjE3NTgzMzc5OTIsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.L64iV-CLcr3eSErHdxG94GTIhstaqNLlto5goTXkPik&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzU1NzQ1OTkyLCJleHAiOjE3NTgzMzc5OTIsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.L64iV-CLcr3eSErHdxG94GTIhstaqNLlto5goTXkPik"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[How The Top 1% Of Cybersecurity Engineers Work ]]></title><description><![CDATA[The Mercenary Mindset.]]></description><link>https://www.cyberwoxunplugged.com/p/how-the-top-1-of-cybersecurity-engineers</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/how-the-top-1-of-cybersecurity-engineers</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 15 Aug 2025 12:03:10 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/167956652/14ab7325a5351d264ec66ea631d2f7e4.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Some people wait to be told what to do. Others move like mercenaries, delivering value before anyone even realizes there&#8217;s a gap.</p><p>This isn&#8217;t about ego, titles, or theatrics. It&#8217;s about execution. About being the kind of operator who steps into chaos and leaves behind clarity through <strong>efficiency</strong>, and <strong>impact</strong>.</p><p>This is the mindset I&#8217;ve been reflecting on lately, particularly as I&#8217;ve transitioned through various roles and companies in my half-decade cybersecurity career.</p><p>We often discuss frameworks, titles, skills, and playbooks in cybersecurity. But sometimes, what separates good from great isn&#8217;t a fancy detection algorithm, a well-polished resume, or even years of experience.</p><p><strong>It&#8217;s how you move.</strong></p><p>I call it the <strong>mercenary mindset</strong>, but not in the &#8220;gun-for-hire&#8221; sense.</p><p>I&#8217;m also not talking about loyalty to the highest bidder or some kind of dark ops aesthetic.</p><p>I&#8217;m talking about the <strong>real mercenary archetype</strong>. The type of person who doesn&#8217;t wait for permission. They don&#8217;t stall for clarity. They don&#8217;t need a job description to act.</p><p>They step in.</p><p>Assess the landscape.</p><p>Adapt to the terrain.</p><p>Execute the mission with precision.</p><p>And most importantly, <strong>they leave things better than they found them</strong>.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from various SOC analyst roles, investigating everything from endpoint threats to building detection systems for cloud-based abuse, so I know exactly what it takes to break into this field and make career advancements.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,500 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1><strong>The Mercenary Archetype</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4aLU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4aLU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4aLU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/baa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!4aLU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Historically, mercenaries have played pivotal roles in shaping outcomes. </p><p>This was not because they were the most powerful, but rather because they were efficient, decisive, and unencumbered by internal red tape.</p><p>Take <a href="https://en.wikipedia.org/wiki/Executive_Outcomes">Executive Outcomes</a>, for example, one of the most well-known private military companies of the 1990s. With a few hundred well-trained personnel and outdated equipment, they helped stabilize conflict zones and secure strategic resources that entire national armies had failed to manage.</p><p>Their success wasn&#8217;t rooted in scale. It was rooted in <strong>clarity of mission</strong> and <strong>precision of execution</strong>.</p><p>Now think about that through the lens of your cybersecurity career.</p><ul><li><p>How often do we see teams spin their wheels waiting for a Jira (or similar system) ticket to be resolved?</p></li><li><p>How many times do people hold off on building a solution because they haven&#8217;t been told to?</p></li><li><p>How many incident remediation tasks get delayed because no one wants to take ownership of the gray areas?</p></li></ul><p><strong>Mercenaries thrive in the gray</strong>. That&#8217;s where the impact is.</p><div><hr></div><h1>Personal Case Studies</h1><h2><strong>Case Study 1: How I Built and Deployed an IR Analysis Procedure in a Single Day</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r6lg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r6lg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r6lg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!r6lg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Not long ago, while I was still working as a Security Engineer on my day job&#8217;s incident response team, a new detection triggered. </p><p>It was built recently and triggered on suspicious behavior, which was something worth investigating. </p><p>But as I looked into it, I quickly realized there was a problem. There was no documented response process for this alert&#8212;nothing for analysts to follow. </p><p>No clear runbook.</p><p>Just ambiguity.</p><p>Guess what? We love ambiguity over here.</p><p>But that ambiguity had a cost.</p><p>Analysts were escalating alerts like this to engineers because they weren&#8217;t confident in the next steps. The result was longer investigation times, duplicated effort, and a slow, inconsistent feedback loop.</p><p>Now I could&#8217;ve waited. </p><p>Sent a Slack message about it. </p><p>Logged a ticket. </p><p>Mentioned it in a weekly sync.</p><p>But that&#8217;s not how mercenaries move.</p><p>While actively working on the escalated alert, I created the missing process in real time. I defined the triage flow, codified the expected behaviors, and scoped it not just to that one alert, but to an entire class of similar alerts. That instantly multiplied the value of the effort.</p><p>Since the investigation involved decoding tokens, I also wrote a lightweight Python script to automate that decoding. It was designed to work within our data confidentiality boundaries while saving analysts significant time.</p><p>By the end of the same day, I had:</p><ul><li><p>Investigated and closed the alert</p></li><li><p>Created a repeatable response framework for similar detections</p></li><li><p>Built a Python tool that the team could use going forward</p></li><li><p>Reduced time-to-resolution for all future alerts in that class</p></li></ul><p>That wasn&#8217;t a heroic moment. That was a <strong>mercenary moment</strong>. </p><p>A single day of focused, strategic work that scaled our team&#8217;s capability in a measurable way.</p><h2><strong>Case Study 2: Dropped into New Terrain and Building from Scratch</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WG_8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WG_8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WG_8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!WG_8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In my previous role as a Cloud Threat Detection Engineer, I primarily worked on cloud infrastructure detections across AWS, Azure, and GCP. </p><p>That was my zone. I had a strong foundation there.</p><p>However, I was then temporarily reassigned to a team focused on cloud workload detection. Think Linux systems, container activity, and Kubernetes clusters. </p><p>This was less familiar territory.</p><p>I could have hesitated. </p><p>Could&#8217;ve waited to get trained up. </p><p>But mercenaries don&#8217;t (can&#8217;t) ask the terrain to change. They <strong>adapt to it</strong>.</p><p>Within one quarter, I developed a structured onboarding framework for new engineers, enabling them to write agent-based and rule-based detections for cloud workloads. </p><p>I mapped out common attacker behaviors, data sources, and detection strategies. I didn&#8217;t just ramp myself up. I reduced the ramp-up time for everyone who came after me.</p><p>Then I was handed a noisy detection for Network Utilities Executed in a Container. It triggered constantly. False positives everywhere. Most engineers would <em>suppress</em> it through exclusion-based detection filters.</p><p>Instead, I decomposed it into multiple high-fidelity detections.</p><ul><li><p>One focused on curl or wget used for data exfiltration</p></li><li><p>Another focused on command-line requests containing suspicious URIs</p></li></ul><p>This approach eventually surfaced real-world threats, including a live PyPI supply chain attack, which abused the curl utility to send data to an attacker-controlled infrastructure.</p><p>That detection wouldn&#8217;t have been possible without decomposing the original alert into something sharper and more intentional.</p><p>I documented the full methodology. I turned that one fix into a repeatable process that others could apply across other detections.</p><p>I wasn&#8217;t the loudest person in the room. I wasn&#8217;t the most senior engineer (in fact, I was the most junior engineer).</p><p>But I delivered the signal where there was noise.</p><p>That&#8217;s <strong>mercenary execution</strong>.</p><div><hr></div><h1>Mercenary Execution</h1><p><strong>Sometimes, Mercenaries Move Fast Because They Love the Fight</strong></p><p>Here&#8217;s the part we don&#8217;t talk about enough.</p><p>Some people move like mercenaries, not because they&#8217;re forced to. </p><p>Not because they want recognition or the money. </p><p>Not because they&#8217;re trying to impress someone.</p><p>Some people move like mercenaries because <strong>they love the work</strong>.</p><p>They love the hunt. The build. The pressure. The challenge of untangling complex security problems and delivering sharp, effective solutions.</p><p>That&#8217;s me. And if you&#8217;re reading this, it&#8217;s probably you, too.</p><p>The reason I could build a runbook, script, and close an investigation all in one day wasn&#8217;t just because it needed to be done. It was because I enjoyed the challenge. </p><p>I liked the problem. </p><p>I was <strong>locked in</strong>.</p><p>When I stepped into an unfamiliar domain, such as Linux and container detection engineering, it wasn&#8217;t just about adapting. It was about embracing the opportunity to grow and build something useful. </p><p>I liked being in the arena. I enjoyed making the messy stuff make sense.</p><p><strong>When you love the work, you don&#8217;t wait for direction. You move.</strong></p><ul><li><p>You build things no one asked for because you know they&#8217;re needed.</p></li><li><p>You care deeply about getting it right, not for applause, but because you find joy in the process.</p></li></ul><p><strong>Loving the work is the cheat code</strong>. It&#8217;s the engine behind sharp execution, fast iteration, and long-term growth.</p><p>It&#8217;s what turns &#8220;extra work&#8221; into meaningful craft.</p><div><hr></div><h1><strong>The Mercenary Playbook</strong></h1><p>This mindset isn&#8217;t about breaking rules or ignoring process.</p><p>It&#8217;s about having a <a href="https://www.amazon.jobs/content/en/our-workplace/leadership-principles">bias toward action</a> and a habit of excellence.</p><p>It looks like:</p><ul><li><p>Prioritizing outcomes over checkboxes</p></li><li><p>Owning the gray areas no one else wants to touch</p></li><li><p>Building tools, docs, and workflows that outlive your tenure</p></li><li><p>Learning just enough to ship, and then learning some more to keep iterating</p></li><li><p>Executing with precision, not waiting for someone to tell you to</p></li></ul><p><strong>Ask Yourself</strong></p><ul><li><p>What&#8217;s a broken process or detection flow that you could fix this week?</p></li><li><p>What uncomfortable space have you been avoiding because it&#8217;s unfamiliar?</p></li><li><p>What would happen if you stopped waiting for permission and started executing with conviction?</p></li></ul><h2><strong>Final Thoughts</strong></h2><p>The mercenary mindset is not about ego or chaos.</p><p>It&#8217;s about precise, repeatable, decisive execution.</p><p>It&#8217;s about leaving things better than you found them.</p><p>And it&#8217;s about loving the mission enough to keep showing up, even when no one&#8217;s watching.</p><p>You don&#8217;t need to be the most senior. You don&#8217;t need a fancy title.</p><p>You need to be the one who <strong>gets things done</strong>.</p><div><hr></div><h1><strong>Cyberwox Resources</strong></h1><h4><strong>Resources for your career</strong></h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><div><hr></div><h1><strong>Closing</strong></h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzUwMDM2MzYwLCJleHAiOjE3NTI2MjgzNjAsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.yefIOBQAgPrM20p1VQBblBYeHUOqudzpaRmbhfcKCa0&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/how-the-top-1-of-cybersecurity-engineers?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/how-the-top-1-of-cybersecurity-engineers?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Getting Your First Cybersecurity Job - College, Certifications & Work Experience]]></title><description><![CDATA[How To Leverage The 4 Levels of Cybersecurity Career Experience.]]></description><link>https://www.cyberwoxunplugged.com/p/getting-your-first-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/getting-your-first-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Sat, 26 Jul 2025 15:52:48 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/169311039/8a75fbadde9bdd727b7b1ff630cc5f8d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Getting your first cybersecurity job will undoubtedly be the hardest of all the cybersecurity jobs you will get throughout your career.</p><p>I've applied to hundreds, if not thousands, of jobs so far, and I certainly didn't get most of them; in fact, I was rejected from most of them, which is entirely normal.</p><p>Most of the jobs I&#8217;ve had have been obtained through referrals and my network, rather than through applications, but that&#8217;s a topic for another day.</p><p>The thing is this: with each rejection, I learned something new, like an area of interviewing that I could improve upon or a skill set that I was missing, and with each application, I became a better and better candidate, landing various jobs, including my current one as a Security Engineer at Amazon.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from various SOC analyst roles, investigating everything from endpoint threats to building detection systems for cloud-based abuse, so I know exactly what it takes to break into this field and make career advancements.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1><strong>My Personal Experience and Advice</strong></h1><p>I'd like to start by sharing with you my experience of applying to a bunch of jobs, combined with my years of experience working in the cybersecurity industry and exposure to lots of colleagues, recruiters, and hiring managers, so that I can give you my take on how you should apply for cybersecurity jobs, depending on how much relevant experience you have.</p><p>For each stage, I'll focus solely on the most critical aspects, such as having a strong resume, an irresistible portfolio, the right technical and problem-solving skills, and an optimized LinkedIn profile, as these will serve as a good baseline to start from.</p><p>That&#8217;s when your career starts to gain direction.</p><p><code>Please note that I use 'Stage' and 'Level' interchangeably for the remainder of this newsletter.</code></p><h2><strong>Level One: No Relevant Experience and No University Degree</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!60EL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!60EL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!60EL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!60EL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!60EL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!60EL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!60EL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!60EL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!60EL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!60EL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let's start with Stage One, where you have no relevant experience, no university degree, and no cybersecurity certification.</p><p>I'm not going to lie; this is a very challenging starting position, but if you're truly determined to become a cybersecurity professional, there are several steps you can take to achieve your goal.</p><p>Your number one priority should be to gain hands-on, relevant experience. </p><p>Depending on your age, I recommend pursuing different activities.</p><p>Say, if you're in high school, and you don't want to go to or cannot go to college for whatever reason, you could apply for apprenticeships or training programs available at your school. </p><p>These programs are typically designed for students nearing the end of high school, such as those in 11th or 12th grade, or for those who have recently graduated from high school. Most large corporations offer similar programs.</p><p>The names of these programs might differ by country, state, or the program itself; they might be called apprenticeships or training programs, but the idea is the same:  </p><ul><li><p>To allow you to develop your skills</p></li><li><p>Get real-life experience</p></li><li><p>Get paid enough at the same time</p></li></ul><p>Even if you don't go for a specific cybersecurity apprenticeship program, as long as you work with technology, systems, or networks as part of the role, you should be fine.</p><p>You could use these programs as a stepping stone to accelerate your journey to become a full-time cybersecurity professional at a very young age.</p><p>Now, if you're not in high school and you've been stuck in another job that you don't like and are super interested in data analytics, I'd recommend focusing on </p><ul><li><p>Learning the technical skills required</p></li><li><p>Getting well-known and knowledge-dense certifications</p></li><li><p>Building a strong portfolio to showcase your skills</p></li><li><p>Writing a great resume</p></li><li><p>Optimizing your LinkedIn profile (more on this later in the newsletter).</p></li></ul><p>I&#8217;ve already created video guides on how to optimize your LinkedIn profile and write a resume, as well as various cybersecurity portfolio projects, where I go through everything in detail. </p><div id="youtube2--Oz8QFVaAg0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-Oz8QFVaAg0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-Oz8QFVaAg0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-JMRCGh5xAtg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;JMRCGh5xAtg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/JMRCGh5xAtg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>However, as a quick summary, I'd start by learning the basics through the CompTIA Trifecta curriculum, then pursue a program like the <a href="https://imp.i384100.net/B0Kz3J">Google Cybersecurity Certificate</a> or <a href="https://imp.i384100.net/baPM4v">Microsoft Cybersecurity Certificate</a>, and finally decide on the path you want to take.</p><p>You can choose either the Offensive or Defensive side of Cybersecurity. Then, I recommend completing labs, projects, and certifications to reinforce this. </p><p>You can also learn a programming language of your choice. I'd personally recommend Python.</p><p>In terms of certifications, I can primarily speak to defensive ones, so you can opt for well-known ones, such as the BTL1 from Security Blue Team, the CCD from CyberDefenders, or the CDSA from HackTheBox.</p><p><a href="https://www.youtube.com/playlist?list=PLDqMNdDvMsRkA4hm81vcnyVKhfToAs6oY">I&#8217;ve made several videos about these certifications on my channel</a>.</p><p>For offensive security, based on a conversation with my friend <a href="https://www.linkedin.com/in/tadi-kadango">Tadi</a>, who&#8217;s an Offensive Security Engineer, you can go for certifications like the eJPT from eLearn Security, the PNPT from TCM Security, or the OSCP from Offensive Security. </p><p>You can watch more about how he got into offensive security, just like me, without a college degree.</p><div id="youtube2-uBs_fdib5Oc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;uBs_fdib5Oc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/uBs_fdib5Oc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>I have already put together a cybersecurity learning framework that you can review at the end of this newsletter.</p><p>I've personally gone through everything at this stage because I got into cybersecurity as a college freshman without a degree, so I can relate to this, and I believe others can too. If you're currently teaching yourself cybersecurity while in college or another situation, feel free to share your feedback in the comments below. </p><p>I'm sure we'd all appreciate hearing your thoughts and insights.</p><h2><strong>Level Two: No Relevant Experience, But Have a University Degree</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!808R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!808R!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!808R!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!808R!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!808R!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!808R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!808R!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!808R!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!808R!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!808R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Moving on to stage two, where you still lack relevant experience but have a college degree. Here, depending on whether you just graduated, are about to graduate, or graduated over three years ago, I would approach applying for jobs differently. </p><p>If you're about to graduate or are a recent graduate, focus on applying to graduate job programs designed for those in their final year of higher education or recent graduates. </p><p>While you probably won't find a cybersecurity-specific graduate program, getting into a program that helps you develop technical skills would be ideal. </p><p>I know several people who transitioned into cybersecurity this way; it often makes the process easier. </p><p>Graduate job programs are beneficial because they typically involve placements lasting six to twelve months and include rotations that provide valuable experience. This allows you to work in various teams and departments, helping you determine what you want to do by learning what you don't want to do. </p><p>If you graduated a while ago, pursued something else, traveled, or life led you in a different direction, and now you want to pursue a career in cybersecurity, I recommend focusing on the cybersecurity roadmap, your resume, portfolio, and certifications outlined in Stage One. </p><p>Also, highlight your degree, especially if you studied relevant fields such as computer science, cybersecurity, IT, or Information Systems, or took courses related to cybersecurity.</p><h2><strong>Level Three: Some Relevant Experience</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1eYa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1eYa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1eYa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!1eYa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let's move on to stage three, where you have some relevant job experience. </p><p>For example, in your current role, you handle Identity and Access Management and work with endpoints or vulnerability scanners daily, or you might be involved in governance, compliance, or similar areas. </p><p>You may not be performing advanced cybersecurity tasks, but you're actively working within the security field. </p><p>For instance, if you're a systems administrator managing user access controls, your duties may differ from those of a cybersecurity analyst; however, you still utilize tools to manage user privileges and create reports for IT meetings and presentations. </p><p>This is valuable experience to highlight at the top of your resume. </p><p>However, since you're applying for a cybersecurity role, emphasize the security aspects of your work that support system integrity rather than just your general IT skills. </p><p>Network management skills are essential and necessary in cybersecurity; however, since they are not the primary focus for recruiters and hiring managers, don't place them at the top of your resume. </p><p>Instead, showcase how well you understand the security implications of user permissions and how effectively you can communicate security threats using data to a non-technical audience, rather than your overall communication skills or IT reporting abilities.</p><h2><strong>Level Four: Plenty of Relevant Experience</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!noYb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!noYb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!noYb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!noYb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!noYb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!noYb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!noYb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!noYb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!noYb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!noYb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Finally, level four, where you have substantial relevant experience and are looking to transition into cybersecurity by applying the skills you've gained throughout your career. </p><p>Let's use a specific scenario, based on personal experience, to demonstrate how you can apply your existing skills to cybersecurity. I</p><p> I have coached someone who worked as a systems administrator, managing various systems, networks, and security protocols daily. </p><p>Their focus was on identifying potential vulnerabilities in the network, managing access controls, ensuring security protocols were in place, and reviewing network packet captures using Wireshark for analysis. </p><p>Although the role was not explicitly cybersecurity-named, the skills they developed over the years were highly applicable to cybersecurity tasks, such as reviewing system logs for anomalies or intrusions, implementing security measures, and developing strategies to mitigate threats. </p><p>If you're in a similar position where your skills are transferable to cybersecurity, I would highlight this relevant work experience at the top of your resume.</p><div><hr></div><h1><strong>Concluding Advice and Encouragement</strong></h1><p>Now, this is probably the most crucial advice, whether you have no experience or a lot, it's not to give up. </p><p>It may sound clich&#233;, but the difference between successful and less successful people isn't really their ability to succeed; it's their ability to bounce back from defeat, failures, and rejections, to work hard, and to improve and grow. </p><p>I&#8217;ve been rejected over a hundred times, maybe even over a thousand, and the first rejection really hurt, so did the second, the tenth, and the hundredth. </p><p>Of course, these rejections affected me; it was a sad, frustrating, and discouraging experience. </p><p>I thought, "This is not fair; I'm clearly doing my best as an entry-level candidate. I've got the certificates, the projects, everything," but that was definitely the wrong mindset. </p><p>The moment I stopped dwelling on the rejections and started analyzing why I was rejected and how I could improve so it wouldn't happen again, everything changed. </p><p>I focused, pushed through, and worked tirelessly. It's this work ethic, the countless hours of learning, the days spent alone in my room, forgoing pleasures, building and sharpening my skills, that landed me my job and helped me grow quickly. </p><p>Don't dwell on the past; live in the present, and focus on the future. Another thing I&#8217;ve learned is to stop comparing myself to others; I'm just trying to do my absolute best and be a good person. </p><p>Everything I've achieved since leaving Nigeria at age 14 has come through my hard work and the grace of my Lord and Savior, Jesus Christ, and I am truly proud of it. </p><p>I hope you can take inspiration from my experience and continue moving forward.</p><p>Remember, it's not success that defines you. It's your ability to bounce back from failures that truly shapes who you are.</p><h1><strong>Recent Content</strong></h1><p><em>A few publications I&#8217;ve released recently</em>.</p><h2><strong>Building A Cyber Threat Intelligence Career with Nigel Boston | EP 26</strong></h2><p>Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional. Nigel has built and led threat intelligence programs that reduce incident response times, operationalize threat intelligence, and automate workflows to help teams focus on what matters: staying ahead of the threat curve.</p><p>In this episode, we discuss how Nigel discovered cyber threat intelligence and carved a path into the field, what core security skills make a difference in Cyber Threat Intelligence, and how threat intelligence intersects with detection engineering, cloud security, and even AI.</p><p>We also dive into the future of threat intelligence, the rise of actionable intelligence, and his new course, Cyber Threat Intelligence Fundamentals, with Ellington Cyber Academy (ECA), which is a game-changer for anyone looking to break into the space.</p><p>We&#8217;ve also had Kenneth, the founder of ECA, in EP 10, so definitely be sure to check that out.</p><p>Whether you're new to cybersecurity or looking to elevate your threat intelligence, this conversation is packed with clarity, strategy, and real-world wisdom.</p><p>Quick side note: This episode was filmed in November 2024, so you can expect to see me with shorter hair.</p><div id="youtube2-FhxvCaArrpg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;FhxvCaArrpg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/FhxvCaArrpg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:167957780,&quot;url&quot;:&quot;https://www.cyberstoriespodcast.com/p/cyber-threat-intelligence-with-nigel-33f&quot;,&quot;publication_id&quot;:2973795,&quot;publication_name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Y3kp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;title&quot;:&quot;Cyber Threat Intelligence with Nigel Boston | EP. 26&quot;,&quot;truncated_body_text&quot;:&quot;Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional. Nigel has built and led threat intelligence programs that reduce incident response times, operationalize threat intelligence, and automate workflows to help teams focus on what really matters: staying ahead of the threat curve.&quot;,&quot;date&quot;:&quot;2025-07-04T16:34:00.000Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;handle&quot;:&quot;cyberwox&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;bio&quot;:&quot;&#10013;&#65039; | Cybersecurity Engineer @Amazon (Ex-Datadog &amp; Optiv). Building a fulfilling cybersecurity engineering career.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-10-02T06:56:32.769Z&quot;,&quot;reader_installed_at&quot;:&quot;2023-10-31T20:35:37.346Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1994687,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:1996296,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:1996296,&quot;name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;subdomain&quot;:&quot;cyberwox&quot;,&quot;custom_domain&quot;:&quot;www.cyberwoxunplugged.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Sharing my cybersecurity engineering career learnings with anecdotes from life.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f98062e-b3db-4b1d-9b38-1525ae2212c9_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;primary_user_id&quot;:172540827,&quot;theme_var_background_pop&quot;:&quot;#9A6600&quot;,&quot;created_at&quot;:&quot;2023-10-02T06:56:50.705Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Dayspring Johnson&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3024612,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:2973795,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:2973795,&quot;name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;subdomain&quot;:&quot;cyberstoriespodcast&quot;,&quot;custom_domain&quot;:&quot;www.cyberstoriespodcast.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Conversations with Tech &amp; Cybersecurity Professionals from diverse backgrounds, experiences, and points of view on building a successful career.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-09-04T05:36:02.914Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Day Johnson&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;podcast&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.cyberstoriespodcast.com/p/cyber-threat-intelligence-with-nigel-33f?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Y3kp!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">Cyber Stories Podcast</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title-icon"><svg width="19" height="19" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
  <path d="M3 18V12C3 9.61305 3.94821 7.32387 5.63604 5.63604C7.32387 3.94821 9.61305 3 12 3C14.3869 3 16.6761 3.94821 18.364 5.63604C20.0518 7.32387 21 9.61305 21 12V18" stroke-linecap="round" stroke-linejoin="round"></path>
  <path d="M21 19C21 19.5304 20.7893 20.0391 20.4142 20.4142C20.0391 20.7893 19.5304 21 19 21H18C17.4696 21 16.9609 20.7893 16.5858 20.4142C16.2107 20.0391 16 19.5304 16 19V16C16 15.4696 16.2107 14.9609 16.5858 14.5858C16.9609 14.2107 17.4696 14 18 14H21V19ZM3 19C3 19.5304 3.21071 20.0391 3.58579 20.4142C3.96086 20.7893 4.46957 21 5 21H6C6.53043 21 7.03914 20.7893 7.41421 20.4142C7.78929 20.0391 8 19.5304 8 19V16C8 15.4696 7.78929 14.9609 7.41421 14.5858C7.03914 14.2107 6.53043 14 6 14H3V19Z" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><div class="embedded-post-title">Cyber Threat Intelligence with Nigel Boston | EP. 26</div></div><div class="embedded-post-body">Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional. Nigel has built and led threat intelligence programs that reduce incident response times, operationalize threat intelligence, and automate workflows to help teams focus on what really matters: staying ahead of the threat curve&#8230;</div><div class="embedded-post-cta-wrapper"><div class="embedded-post-cta-icon"><svg width="32" height="32" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">
  <path classname="inner-triangle" d="M10 8L16 12L10 16V8Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><span class="embedded-post-cta">Listen now</span></div><div class="embedded-post-meta">10 months ago &#183; Day Johnson</div></a></div><h2><strong>Detection-In-Depth</strong></h2><p>A guest post on <strong><a href="https://dispatch.thorcollective.com/">THOR Collective</a></strong> Dispatch!</p><p><em>Also featured on the <a href="https://tldrsec.com/p/tldr-sec-282">tl;dr sec</a> newsletter issue #282 under the blue team section, and as a Detection Engineering Gem in issue #112 of the <a href="https://www.detectionengineering.net/p/det-eng-weekly-113-can-i-get-a-rule">Detection Engineering Weekly</a> Newsletter!</em><br><br>I explore the mindset of <strong>detection-in-depth</strong>, which is first a play on the existing &#8220;defense-in-depth&#8221; concept, outlining a strategy where defenders aim to catch adversaries across every stage of their attack, not just during initial access.<br><br>It walks through:<br>- Why detection-in-depth means catching adversaries at every stage, not just the first or somewhere in the middle.<br>- The importance of tuning OOTB rules for the context and uniqueness of your environment<br>- How precision and not just coverage make alerts more effective<br><br>This one&#8217;s for security engineers, IR folks, and anyone who&#8217;s ever looked at an alert and thought, &#8220;This could be better.&#8221;</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:162946825,&quot;url&quot;:&quot;https://dispatch.thorcollective.com/p/detection-in-depth&quot;,&quot;publication_id&quot;:3916490,&quot;publication_name&quot;:&quot;THOR Collective Dispatch&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!8mB0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f0d0d66-07ae-4f5b-a26a-b6d91cfc488e_1280x1280.png&quot;,&quot;title&quot;:&quot;Detection-In-Depth&quot;,&quot;truncated_body_text&quot;:&quot;Detection-in-depth is an evolution of the classic cybersecurity principle known as defense-in-depth. Defense-in-depth means that no single security control can fully protect an environment&#8212;instead, multiple layered defenses must work together to slow down, detect, and ultimately stop adversaries.&quot;,&quot;date&quot;:&quot;2025-05-08T15:01:49.630Z&quot;,&quot;like_count&quot;:26,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;handle&quot;:&quot;cyberwox&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;bio&quot;:&quot;&#10013;&#65039; | Cybersecurity Engineer @Amazon (Ex-Datadog &amp; Optiv). Building a fulfilling cybersecurity engineering career.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-10-02T06:56:32.769Z&quot;,&quot;reader_installed_at&quot;:&quot;2023-10-31T20:35:37.346Z&quot;,&quot;is_guest&quot;:true,&quot;bestseller_tier&quot;:null,&quot;primaryPublicationId&quot;:1996296,&quot;primaryPublicationName&quot;:&quot;Cyberwox Unplugged&quot;,&quot;primaryPublicationUrl&quot;:&quot;https://www.cyberwoxunplugged.com&quot;,&quot;primaryPublicationSubscribeUrl&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://dispatch.thorcollective.com/p/detection-in-depth?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!8mB0!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f0d0d66-07ae-4f5b-a26a-b6d91cfc488e_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">THOR Collective Dispatch</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Detection-In-Depth</div></div><div class="embedded-post-body">Detection-in-depth is an evolution of the classic cybersecurity principle known as defense-in-depth. Defense-in-depth means that no single security control can fully protect an environment&#8212;instead, multiple layered defenses must work together to slow down, detect, and ultimately stop adversaries&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">a year ago &#183; 26 likes &#183; Day Johnson</div></a></div><h2><strong>Career Quest: Cybersecurity Careers with Day Johnson</strong></h2><p>I had the pleasure of sitting with students from my Alma mater (WGU) and sharing with them about Cybersecurity career pathways.</p><div id="youtube2-CQM-2uKOmP0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;CQM-2uKOmP0&quot;,&quot;startTime&quot;:&quot;711s&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/CQM-2uKOmP0?start=711s&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Getting Your First CYBERSECURITY Job - College, Certifications &amp; Work Experience</h2><p>The YouTube version of this post!</p><div id="youtube2-IJULNe9Gkeg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;IJULNe9Gkeg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/IJULNe9Gkeg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1><strong>Closing</strong></h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzUwMDM2MzYwLCJleHAiOjE3NTI2MjgzNjAsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.yefIOBQAgPrM20p1VQBblBYeHUOqudzpaRmbhfcKCa0&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/getting-your-first-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/getting-your-first-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[My Honest Thoughts on the Cybersecurity Job Market in 2025 ]]></title><description><![CDATA[Artificial Intelligence (AI), Outsourcing & Economic Turmoil.]]></description><link>https://www.cyberwoxunplugged.com/p/my-honest-thoughts-on-the-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/my-honest-thoughts-on-the-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 01 Jul 2025 14:18:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/165570612/653b6e655d00ccb65df8dc941d32ea92.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In 2025, the cybersecurity job market presents a paradox.</p><p>On one hand, the <strong>global shortage of cybersecurity professionals</strong> remains a pressing issue.</p><p>According to <strong><a href="https://cybersecurityventures.com/jobs-report-2021/">Cybersecurity Ventures</a></strong>, there are <strong>3.5 million unfilled cybersecurity positions worldwide</strong>, a number that has persisted since 2021.</p><p>In the U.S. alone, nearly <strong><a href="https://www.comptia.org/en-us/resources/research/state-of-cybersecurity-2025/">470,000 cybersecurity job openings</a></strong> were reported between May 2023 and April 2024.</p><p>On the other hand, specific traditional roles are experiencing a decline.</p><p>Job postings for <strong>Security Engineers</strong> and <strong>Security Analysts</strong> <strong><a href="https://www.scworld.com/analysis/cybersecurity-job-market-faces-disruptions-hiring-declines-in-key-roles-amid-automation-and-outsourcing">have decreased</a></strong> by approximately <strong>25%</strong> from 2022 to 2024.</p><p>This decline is <strong><a href="https://www.cybersecuritytribe.com/news/us-cybersecurity-recruitment-trends-for-2025?utm_source=chatgpt.com">attributed</a></strong> to factors such as automation, outsourcing, and the evolving nature of cybersecurity threats.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from SOC analyst roles, investigating everything from endpoint threats to cloud-based abuse, so I know exactly what it takes to break into this field.</p><p>I started just like many of you&#8212;learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this. </p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>The Impact of AI on Cybersecurity Roles</h1><p>Now, let's dive into this issue by first understanding the impact of AI on cybersecurity operations.</p><h3>Automation and Augmentation</h3><p>Artificial Intelligence (AI) is revolutionizing cybersecurity operations.</p><p>AI systems are now capable of analyzing vast amounts of data, detecting anomalies, and responding to threats in real-time.</p><p>For instance, AI can process up to <strong><a href="https://cloud.google.com/transform/101-real-world-generative-ai-use-cases-from-industry-leaders">billions of data points daily</a></strong>, significantly enhancing threat detection and similar capabilities.</p><p>However, this innovation is a double-edged sword.</p><p>While it increases efficiency, <strong>it also reduces the demand for entry-level roles</strong> focused on routine cybersecurity tasks.</p><p>Conversely, there is a growing need for professionals who can architect, manage, and oversee AI-driven systems, interpret complex data, have a deep understanding of cyber threats, and make informed strategic decisions.</p><div><hr></div><h2>The Rise of Outsourcing in Cybersecurity</h2><h3>Globalization of Cybersecurity Services</h3><p>Outsourcing has also become a significant trend in cybersecurity.</p><p>Organizations are increasingly turning to <strong>Managed Security Service Providers (MSSPs)</strong> and <strong>Security Operations Center as a Service (SOCaaS)</strong> to handle their security needs.</p><p>This shift is driven by factors such as cost-effectiveness, access to specialized expertise, and the need for 24/7 monitoring.</p><p>While outsourcing offers benefits to organizations, it also affects job opportunities for cybersecurity professionals.</p><p>There's a growing emphasis on roles that require professionals who can bridge the gap between outsourced services and organizational objectives.</p><div><hr></div><h2>Economic Factors Influencing the Cybersecurity Job Market</h2><h3>Budget Constraints and Strategic Investments</h3><p>Economic pressures are also influencing how organizations allocate resources to cybersecurity.</p><p>While overall spending on cybersecurity continues to grow, there is a shift toward strategic investments in people, technologies, and services that offer <strong>the highest return on investment</strong>.</p><p>This includes AI-driven solutions, cloud security, and advanced threat detection systems.</p><h3>Regulatory Compliance and Risk Management</h3><p>Additionally, international regulatory requirements are becoming more stringent and, quite frankly, <strong><a href="https://www.edpb.europa.eu/news/news/2023/12-billion-euro-fine-facebook-result-edpb-binding-decision_en">more expensive</a></strong>, compelling organizations to invest in compliance and risk management.</p><p>This trend is creating demand for professionals skilled in <strong>Governance, Risk, and Compliance (GRC)</strong>, as well as those who can navigate complex regulatory landscapes.</p><p>In fact, there has been a substantial increase in specialized cybersecurity roles focused on data protection and user privacy, particularly in positions such as Privacy Engineering, Data Protection Officers (DPOs), and Privacy Compliance Specialists.</p><p>Across various roles, I&#8217;ve also experienced legal professionals being embedded in cybersecurity organizations, both product-focused and operationally focused.</p><p>These roles have become increasingly critical as organizations navigate complex privacy regulations and consumer data protection requirements.</p><div><hr></div><h1>What Now?</h1><p>So what does all this mean for you?</p><p>You already know that AI is changing the game, but it <strong>can&#8217;t replace real-world experience</strong>.</p><p>You can&#8217;t prompt your way out of a real-world incident. You can&#8217;t ChatGPT your way through a breach when a customer&#8217;s data is at risk for a publicly traded company.</p><p>What you <em>need</em> is reps. What you <em>need</em> is judgment.</p><p>And that&#8217;s precisely why DFIR Labs, the sponsor of this issue, stood out to me.</p><div class="pullquote"><p><strong>DFIR LABS BY THE TEAM BEHIND THE DFIR REPORT</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PEdp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PEdp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 424w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 848w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 1272w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PEdp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png" width="400" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The DFIR Report&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The DFIR Report" title="The DFIR Report" srcset="https://substackcdn.com/image/fetch/$s_!PEdp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 424w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 848w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 1272w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Gain hands-on access to the type of cyber chaos that no simulation can recreate: with ambiguous enterprise logs, noisy alerts, subtle lateral movement, and the tactics real attackers use when they breach your network. Based on&nbsp;<strong>actual intrusion cases</strong>&nbsp;grounded in incidents that occurred in the wild, you&#8217;ll learn to think like an analyst, not just follow a checklist, and begin to recognize attacker behavior and tradecraft in real telemetry. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://bit.ly/cwx-dfirlabs-training&quot;,&quot;text&quot;:&quot;Master DFIR with Hands-on Labs&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://bit.ly/cwx-dfirlabs-training"><span>Master DFIR with Hands-on Labs</span></a></p></div><h1>Positioning yourself for success</h1><p>Alright &#8212; now let&#8217;s talk about how to position yourself to win in this new cybersecurity world.</p><h3>1 - Embrace Continuous Learning</h3><p>If there&#8217;s one trait that separates those who <em>thrive</em> in cybersecurity from those who eventually stagnate, it&#8217;s an unshakable commitment to <strong>continuous learning</strong>.</p><p>Cybersecurity isn&#8217;t just dynamic, it&#8217;s also <em>volatile</em>.</p><p>The threat landscape doesn&#8217;t evolve year to year. It changes by the week, sometimes by the day.</p><p>New CVEs drop. New threat actors emerge. Cloud platforms update security models. AI opens doors to both powerful defense tools and new classes of adversarial abuse.</p><p>If you&#8217;re not consistently sharpening your skills, you&#8217;re falling behind.</p><p>But here&#8217;s the nuance people miss:</p><p>Continuous learning isn&#8217;t just about earning certs or reading blog posts. That&#8217;s important, yes &#8212; but it&#8217;s not enough.</p><p><strong>You need friction. You need context. You need reps.</strong></p><p>Because cybersecurity isn&#8217;t just a knowledge game, it&#8217;s a <strong>judgment game</strong>.</p><p>You don&#8217;t just need to <em>know</em> what lateral movement is. You need to <em>recognize</em> it when it&#8217;s buried under ten thousand other logs.</p><p>You need to know when a misconfiguration is just sloppy infrastructural negligence, and when it&#8217;s signaling malicious intent.</p><p>That&#8217;s how you build instincts. That&#8217;s how you learn to investigate under pressure, follow leads, ask better questions, and ultimately become the kind of security professional companies <em>can&#8217;t automate away</em>.</p><h3>2 - Develop Cross-Functional Expertise</h3><p>A while back, Cybersecurity used to live in a silo.</p><p>You had the network engineering people, the developers, the infrastructure teams, and somewhere in a dark corner, the security team that everyone avoided unless something went really wrong.</p><p>But in 2025, that model is dead.</p><p>Today, <strong>cybersecurity is both a business enabler and a cost center.</strong></p><p>So if you're not thinking cross-functionally, you&#8217;re not thinking strategically.</p><p>Gone are the days when your job was monitoring logs, patching systems, or tweaking firewall rules.</p><p>That&#8217;s table stakes.</p><p>Organizations now expect security professionals to operate at the intersection of <strong>technology, business, risk, and communication</strong>.</p><p>Here&#8217;s what that means:</p><ul><li><p>You need to understand how security decisions impact <strong>product development</strong></p></li><li><p>You need to know how an exploited misconfiguration can affect <strong>customer trust</strong> and potential <strong>revenue</strong>.</p></li><li><p>You should be able to explain to an executive why an unpatched vulnerability is not just a CVSS score, but could lead to <strong>real financial liability</strong>.</p></li><li><p>And when you&#8217;re working in the cloud? Understanding <strong>DevOps</strong>, <strong>CI/CD pipelines</strong>, <strong>IaC</strong>, and <strong>cloud-native architecture</strong> isn&#8217;t a &#8220;nice to have.&#8221; It&#8217;s baseline fluency.</p></li></ul><p>The best cybersecurity engineers I know and I&#8217;ve worked with aren&#8217;t just technically sharp &#8212; they&#8217;re also able to walk into a room of stakeholders from engineering, product, legal, and compliance and explain what&#8217;s at risk in <strong>plain English</strong>.</p><p>They know when to escalate, when to advise, and when to collaborate.</p><p>And let me say this clearly: <strong>Being technically brilliant but context-blind will hold you back</strong>.</p><p>You&#8217;ll get overlooked for leadership roles, for strategic projects, even for the kind of work that really moves the needle.</p><p>Cross-functional expertise doesn&#8217;t mean you have to be an expert in everything.</p><p>It means you need to build enough breadth to communicate effectively and enough depth to execute responsibly.</p><p>It&#8217;s about thinking beyond just systems and endpoints.</p><p>It&#8217;s about understanding <strong>the business</strong> and helping protect the <strong>entire value chain</strong> &#8212; from source code to customer experience.</p><p>Learn that, and you become indispensable.</p><h3>3 - Cultivate Soft Skills</h3><p>Let&#8217;s be real &#8212; when most people hear &#8220;soft skills,&#8221; they roll their eyes.</p><p>Especially in cybersecurity, where it&#8217;s easy to assume the only thing that matters is how technically sharp you are.</p><p>Can you reverse engineer malware? Write detections? Secure infrastructure?</p><p>That stuff matters and is important. No question. <strong>Full stop.</strong></p><p>But here&#8217;s what a lot of early-career folks don&#8217;t realize until it&#8217;s too late:</p><p><strong>The further you grow in cybersecurity, the more your success depends on your ability to work with people.</strong></p><p>Not tools. Not terminals. Not tickets. <strong>People.</strong></p><p>Soft skills &#8212; and I&#8217;m talking about honest communication, leadership, and emotional intelligence &#8212; are what separate good security engineers from the ones who actually lead initiatives, gain trust, and make strategic impact.</p><p>Here&#8217;s what cultivating soft skills actually looks like in our field:</p><ol><li><p>Being able to walk into a tense post-incident review and <strong>clearly explain what happened</strong> without throwing anyone under the bus.</p></li><li><p>Communicating risk to leadership in the <strong>language they understand</strong> by translating technical findings into business impact.</p></li><li><p>Navigating cross-functional friction when the security team is seen as the &#8220;department of no&#8221; and flipping that perception by being a <strong>partner</strong>, not a blocker.</p></li><li><p>Mentoring junior engineers &amp; analysts. Holding your team accountable. Knowing how to escalate a threat <em>without</em> creating panic.</p></li></ol><p>These are the moments that make or break trust.</p><p>And trust is the currency of cybersecurity.</p><p>If your team doesn&#8217;t trust you, if your leadership doesn&#8217;t listen to you, if your partners tune you out, your technical brilliance won&#8217;t matter.</p><p>You&#8217;ll be ignored. Or worse, replaced.</p><p>Now here&#8217;s the part most people underestimate:</p><p>Soft skills aren&#8217;t just about external collaboration.</p><p>They&#8217;re also about <strong>internal regulation</strong>.</p><ul><li><p>Can you stay calm during a high-severity incident?</p></li><li><p>Can you manage your time across competing priorities?</p></li><li><p>Can you ask for help before burnout takes over?</p></li><li><p>Can you receive feedback without getting defensive?</p></li></ul><p>These are human skills.</p><p>And cybersecurity, for all the talk about code and exploits and zero-days, is a deeply <strong>human field</strong>.</p><p>We&#8217;re dealing with threat actors &#8212; humans.</p><p>We&#8217;re protecting people&#8217;s data &#8212; humans.</p><p>We&#8217;re collaborating across teams &#8212; again, humans.</p><p>So if you want to go far in this field, not just technically, but as someone others want to work with, then don&#8217;t just cultivate your knowledge.</p><p><strong>Cultivate your character.</strong></p><p>That&#8217;s what creates longevity. That&#8217;s what builds leadership. That&#8217;s what keeps you relevant in a space that&#8217;s changing faster than ever.</p><div><hr></div><h1><strong>Cyberwox Resources</strong></h1><h4><strong>Resources for your career</strong></h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><h1><strong>Recent Content</strong></h1><p><em>A few publications I&#8217;ve released recently</em>.</p><p><strong>My Honest Advice On Starting A Cybersecurity Career in 2025 (in less than 5 mins)</strong></p><p>Advice from my 5 years of learning, teaching, and working in the cybersecurity industry (in less than 5 mins).</p><div id="youtube2-56pS-H2h1fg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;56pS-H2h1fg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/56pS-H2h1fg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Building a DNS Server with Python - 2 (Parsing The Header)</strong></p><p>Second installment of this series, in this case we&#8217;re parsing the header.</p><div id="youtube2-xGzkDzMGECY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;xGzkDzMGECY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/xGzkDzMGECY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Detection-as-Code &amp; CI/CD for Detection Engineering with Dennis Chow | Detection Opportunities EP 9</strong></p><p>Detection as Code is one of the most importnat evolutions in modern security detection, and in this video, we break it down. </p><p>I first encountered this concept as a Cloud Threat Detection Engineer at Datadog. Today, I&#8217;m joined by <strong><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbm0zVDJCd1lNTkJxT1JBM08zNEsxa05SRXJ4d3xBQ3Jtc0trTUlEZUd6Qjh4U0JBeEhOdEJ1akhEMldCOXZVd2hrbWRXM2ViUkx0YzNkRjRiZWJjUXVob0RxYWxzVktMS0R5MTQyWkJrUHBlcGI4cklLUWxuVGxfQlYzeV9HblZORElHVXBzdFJtNWM1enRoTTd0aw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fdwchow%2F&amp;v=Uw0r7lGN__Q">Dennis Chow</a></strong>, a Detection Engineering specialist and author of Automating Security Detection Engineering (which I had the honor of technically reviewing). </p><p>Together, we explore what Detection as Code really means and walk through two hands-on CI/CD pipeline demos: </p><p>&#128313; Lab 1: Building SIEM detections with synthetic AI testing using Sumo Logic </p><p>&#128313; Lab 2: Policy-as-Code integration testing with Cloud Custodian on GCP. </p><p>You&#8217;ll learn how Detection as Code leverages Git, automated testing, reproducibility, collaboration, and CI/CD to make detection engineering more scalable, accountable, and reliable.</p><div id="youtube2-Uw0r7lGN__Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Uw0r7lGN__Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Uw0r7lGN__Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>My Honest Thoughts on the Cybersecurity Job Market in 2025</strong></p><p>The YouTube version of this post!</p><div id="youtube2-CReZS2SFpt4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;CReZS2SFpt4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/CReZS2SFpt4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1><strong>Closing</strong></h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzUwMDM2MzYwLCJleHAiOjE3NTI2MjgzNjAsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.yefIOBQAgPrM20p1VQBblBYeHUOqudzpaRmbhfcKCa0&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/my-honest-thoughts-on-the-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/my-honest-thoughts-on-the-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item></channel></rss>