top of page



Turns Out the Trojan Horse Was the Ultimate Human Exploit
I've been sitting here thinking about Trojan horses. Yep, the wooden kind from 3,000 years ago—but also the ones popping up today: drones...

Rich Washburn
Jun 133 min read


Spiderweb.exe: When Your Military Has Hackers
On June 1st, Russia got hacked. Not digitally—but operationally. Dozens of drones launched from inside its own borders took out nearly 40...

Rich Washburn
Jun 23 min read


PSA: Facebook “Breach” Claims and Apple’s AirPlay Flaws – What’s Real and What’s Rinse & Repeat
You ever feel like déjà vu in cybersecurity is just Tuesday? Yeah, me too. So let’s break this down: There's a loud claim flying around...

Rich Washburn
May 233 min read


Zero-Click, Wormable, and in Your Living Room: The AirPlay Exploit That Shouldn’t Exist (But Does)
Imagine walking into your house and your Bluetooth speaker silently hacks your phone—no pop-ups, no permissions, no downloads. Just......

Rich Washburn
May 23 min read


Pixelation Is Not Protection: Why Your Blur Tool Might Be Lying to You
Imagine you're caught in a gunfight. You dive behind a cardboard box. It hides you from view, but it won't stop a bullet. That's...

Rich Washburn
Apr 192 min read


Every Single Social Security Number, Phone, and Address Has Leaked on the Internet! 2.6 Billion Total
Data breaches have become the digital equivalent of a coffee spill on your keyboard—annoying, potentially disastrous, but seemingly...

Rich Washburn
Aug 14, 20243 min read


How John The Ripper Shapes Modern Password Safety
John The Ripper, often abbreviated as "JtR" or simply "John," more than just a password cracker is also a comprehensive framework for...

Rich Washburn
Apr 29, 20242 min read


Automated Threats: How AI is Shaping the Future of Cybersecurity
Artificial intelligence (AI) has emerged as a double-edged sword in the realm of cybersecurity. Recent developments suggest that AI...

Rich Washburn
Apr 29, 20242 min read


Nation-State Backdoor Found in Cisco Firewalls (Again?)
A recent concerning discovery has been made regarding Cisco's Adaptive Security Appliances (ASAs)—a series of security devices acting...

Rich Washburn
Apr 29, 20242 min read


Inside the Chinese Hacking Tools Giga Leak
The recent discovery of a massive data leak, purportedly revealing the inner workings and cyber espionage tools of a Chinese company, has...

Rich Washburn
Feb 21, 20242 min read


Using PhoneInfoga for Digital Forensics
PhoneInfoga, a versatile tool for digital forensics and ethical hacking. PhoneInfoga is designed to uncover detailed information about...

Rich Washburn
Dec 9, 20232 min read


America is Pushing China Out of the Internet
Introduction: Undersea data cables, a pivotal component in global internet infrastructure, is at the heart of a burgeoning geopolitical...

Watchtower
Nov 21, 20232 min read


Digital Reconnaissance: Leveraging Open-Source Tools for Enhanced Security
When it comes to the cyber world, information is power. Open-Source Intelligence (OSINT) is all about obtaining this information from...

Rich Washburn
Oct 22, 20232 min read
bottom of page