CyberDesserts
Learn Cybersecurity By Doing

Latest

17
Jan
AI Security Assistant

Why I Built An AI Security Assistant

I write about prompt injection attacks on this blog. It felt hypocritical to explain threats I had never actually defended
4 min read
01
Jan
Vibe coding

When AI Writes the Code, Who Catches the Bugs?

In December 2025, Boris Cherny, creator of Anthropic's Claude Code, revealed he hadn't opened an IDE
6 min read
01
Jan
ClickFix

What is ClickFix? The Social Engineering Attack Bypassing Your Defences

ClickFix attacks surged 517% in the first half of 2025, now accounting for 8% of all blocked attacks (ESET, 2025)
6 min read
28
Dec
Hacktivist DDoS Attacks: A Defender's Guide

Hacktivist DDoS Attacks: A Defender's Guide

NoName057(16) has targeted 3,700+ hosts in thirteen months. Their playbook is predictable: strike during elections, holidays, and geopolitical flashpoints. Here's what the La Poste attack reveals about defending against hacktivist DDoS.
8 min read
27
Dec
14 Crypto Scams to Watch For in 2026

14 Crypto Scams to Watch For in 2026

Cryptocurrency scam losses reached $9.3 billion in the United States alone in 2024, a 66% increase from the previous
20 min read
27
Dec
MongoBleed Exploit CVE-2025-14847

MongoBleed Exploit: The MongoDB Memory Leak Hitting 87,000 Servers

Updated January 10, 2026: CISA's remediation deadline for federal agencies is January 19. Ubuntu has retracted its claim
10 min read
22
Dec
Prompt Injection Attacks: Examples, Techniques, and Defence

Prompt Injection Attacks: Examples, Techniques, and Defence

Researchers tested 36 LLM-integrated applications and found 31 vulnerable to prompt injection. That is an 86% failure rate (HouYi Research,
13 min read
21
Dec
Building a Second Brain for Cybersecurity Work

Building a Second Brain for Cybersecurity Work

Sixty-five percent of security professionals report their job has become harder in the past two years (ISSA/ESG, 2024). New
6 min read
16
Dec
CTEM Lifecycle > Scoping > Discovery > Prioritization ? Validation > Mobilization

What is CTEM? Complete Guide to Continuous Threat Exposure Management

Gartner predicts that by 2026, organisations prioritising security investments based on a CTEM program will suffer two-thirds fewer breaches. Meanwhile,
9 min read
15
Dec
npm Security: The Complete Guide to Package Vulnerabilities

npm Security: The Complete Guide to Package Vulnerabilities

npm processes 4.5 trillion package requests annually, representing 70% year-over-year growth (Sonatype, 2024). This scale makes the JavaScript ecosystem
12 min read