<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Dennis on Cybersecurity]]></title><description><![CDATA[The opinions and education in these publications are built on years of challenging the norms as a digital iconoclast. I have a reputation for building solutions to problems still emerging, or finding the critical point to future success.]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com</link><image><url>https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png</url><title>Dennis on Cybersecurity</title><link>https://dennis-on-cybersecurity.cybercrucible.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 18 May 2026 04:17:20 GMT</lastBuildDate><atom:link href="https://dennis-on-cybersecurity.cybercrucible.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Dennis Underwood]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[dennisunderwoodoncybersecurity@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[dennisunderwoodoncybersecurity@substack.com]]></itunes:email><itunes:name><![CDATA[Dennis Underwood]]></itunes:name></itunes:owner><itunes:author><![CDATA[Dennis Underwood]]></itunes:author><googleplay:owner><![CDATA[dennisunderwoodoncybersecurity@substack.com]]></googleplay:owner><googleplay:email><![CDATA[dennisunderwoodoncybersecurity@substack.com]]></googleplay:email><googleplay:author><![CDATA[Dennis Underwood]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Vibe Coding Your Way to Success at Any Cost]]></title><description><![CDATA[Just back those new servers up to the loading dock, boss!]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/vibe-coding-your-way-to-success-at</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/vibe-coding-your-way-to-success-at</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Thu, 16 Apr 2026 13:01:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every now and again, the topic of "vibe coding" comes up either internally or with customers or partners.<br>Internally, it is usually checking in every few months to see if the time investment is worth it to use AI-generated code, then go in and clean everything up.<br>I could see how it would have been useful in the very beginning, but we haven't seen the ROI (Return on Investment) yet.<br>That may change in the future.<br><br>Or, we see a candidate or project-based contractor produce code that seems to go on a spiritual journey, collect a bunch of errors, but somehow eventually come up with the right answer. Sometimes. We usually realize, when we start asking questions, they weren't writing the code themselves, but were trusting their trusty AI tool in the ultimate imposter syndrome feat ever.<br><br>I saw this analogy online, and it is by far the best example of the difficulties in vibe coding.<br>In this case, the program did, indeed, eventually come up with the right answer for this specific use case.<br>Move the track at all? Different vehicle? Any other variable? Failure.<br>Efficient? Absolutely not.<br><br>In computery-things, this would mean programs that succeed sometimes, fail sometimes, and you can never quite tell how long they will take or how many resources they will need.<br>There is one cybersecurity tool in particular I'm thinking of right now, that the EDR defeat (aka, antivirus killer) folks have difficulty with.<br>NOT because their quality matches their marketing.<br>Instead, it is because the company started vibe coding, and you are never quite sure what the same program will do from one iteration to the next.<br>That lack of stability means sometimes the malware is caught, sometimes not.<br>It also means sometimes the antivirus-killer exploit works, and sometimes it crashes the system. Crazy stuff.<br><br>Life is going to be really profitable for software engineers that can debug logic errors, and test for them. Not as much for the ones that can't.<br>I can't say when, but I would humbly recommend using this "time of innocence" to ensure your debugging and testing skills are ready for the inevitable "the code looks great, and our AI code analysis tools says it is great, but 2+2 is giving us strange answers sometimes, and we can never tell how long it will take or how much RAM we need one day to the next".<br><br>Of course this conversation avoids the trauma of customers trying to explain to suppliers what they want, and suppliers trying to produce what customers are thinking. That isn't really a computer thing. I experience the same issue when being told to get cheese while I'm out.</p>]]></content:encoded></item><item><title><![CDATA[If you drown in maple syrup]]></title><description><![CDATA[Do the AI written obituaries make fun of you, or recognize your achievement?]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/if-you-drown-in-maple-syrup</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/if-you-drown-in-maple-syrup</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Tue, 14 Apr 2026 13:00:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VG1W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Let's chew the fat for a minute, and talk about too much of a good thing.<br><br>Speaking of chewing the fat, bacon fat makes for some great maple syrup glazes.<br><br>The numbers are all over the place, with respect to:<br>1. How many employees admit they use AI in the workplace, and<br>2. How much of proprietary data they push up to AI.<br><br>The numbers are bad if you are concerned about unmanaged data leaks by strange applications.<br>Strange watery tarts throwing swords at people, letting people wield supreme executive power? Also bad.<br><br>Possibly 95% of the files uploaded to AI contain proprietary data.<br>Around half of the employees admit they use unauthorized AI tools. So, figure around 75%.<br>Much like getting a company to admit to ransomware for statistics gathering (especially with The Fuzz calls), getting employees to answer truthfully for something they know they probably shouldn't admit to is a bit of a challenge.<br><br>AI has some pretty cool uses.<br>I love using it to take a 3000 word essay, and make executive summaries.<br>I'm too suspicious to do the opposite; I'll have to find a college student to ask concerning effectiveness.<br><br><a href="https://www.linkedin.com/company/cybercrucible/">Cyber Crucible, Inc.</a> ran into a bit of an issue with alerting on violations of AI acceptable use.<br>An alert or two from Sue in Accounting was the expected output.<br>Not 1,000 alerts for an AI tool determined to upload and analyze all the data.<br>So we had to do some quick refinement on alerts.<br>That can be too much of a good thing.<br>Well, depending on who is doing it, and what data.<br>In this case, not a good thing.<br>Improper AI tool usage blocked by the kernel, but far too many alerts.<br><br>Somehow, cybersecurity vendors have trained us all that an endless stream of false positives are needed to demonstrate value. My theory is they all miss the days of pagers going off night and day.<br><br>One alert of data access being blocked by an AI tool being used by a user or service account is enough.<br>I was a huge pager fan before I could afford a cell phone.<br>Until I got one for work.<br><br>Now if you'll excuse me, I need to find more syrup for my poutine, and settle in for a long night of Knight Rider reruns.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VG1W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VG1W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VG1W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VG1W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VG1W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VG1W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg" width="800" height="1066" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1066,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:126412,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://dennis-on-cybersecurity.cybercrucible.com/i/191610975?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VG1W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VG1W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VG1W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VG1W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50fe3e9a-7c03-44ba-b73c-51526dab93a2_800x1066.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Go Go Gadget....Artificial Intelligence]]></title><description><![CDATA[Or, how to get stranded on a date. Nothing in between.]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/go-go-gadgetartificial-intelligence</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/go-go-gadgetartificial-intelligence</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 10 Apr 2026 13:03:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I might be in the wrong Yahoo chat room , but I see an emerging challenge with the misuse of AI in the workplace that I don't see addressed much.<br><br>Several times, I've been stuck with questions or authoritative comments about <a href="https://www.linkedin.com/company/cybercrucible/">Cyber Crucible, Inc.</a>, or myself, or my team, that are patently incorrect and defy logic as to why these things are said.<br>Please notice I left "technical topics" off of that list. I'm not talking about someone needing educated on a topic - that's healthy and we *should* be sharing knowledge on things we know a lot about!<br><br>Rather than get lost in specific examples, let's do a fun little dating analogy. Admittedly, a game I have not played in many years.<br>Your date shows up with a bunch of information about you, that they are happy to communicate with you, that a bit of thought would have cause for pause.<br>"How do you live without driving?"<br>Sir/Miss -- you are literally sitting in my car right now. I picked you up, and brought you here to the restaurant in said car.<br><br>Sounds more horrifying than normal dating, I assume.<br><br>Would you go on that second date? Unlikely. You may even pay for a cab for them for the way home.<br><br>I have seen this type of Twilight Zone engagement around 10 times in the past 9 months or so. The only answer I can guess, since most people are not severely mentally ill, is that AI is spitting out incorrect answers for them to ask, or incorrect information, and it is not being reviewed before sending it out.<br><br>In my company, we've even queried different AI tools just to make sure there's not craziness in the AI answers. Some improvement to be had, for sure. AI is not as foolproof as Inspector Gadget. Not wildly inappropriately wrong information though.<br><br>So while I may be confused with the Dennis Underwood Water Treatment manager, when questioning my experience in cybersecurity, a 15 second double check of whatever AI spit it out probably would have saved some unspoken embarrassment.<br><br>I'm not going to use crude language, and there really isn't "an assistant" they can truthfully blame. A real EA would likely NOT give their boss bullets on Cyber Crucible's metallurgical operations).<br>So I just try to move the conversation past some type of Family Guy skit material.<br>I can't be the only one.<br>The examples I gave are roughly equivalently farcical to the real ones over the past several months. Not more frequently thank goodness, or I'd start wondering if I'm on The Truman Show.<br><br>Maybe we just need to double check what our AI tools spit out, BEFORE they get emailed around.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Kr8j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Kr8j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Kr8j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Kr8j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Kr8j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Kr8j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg" width="195" height="259" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:259,&quot;width&quot;:195,&quot;resizeWidth&quot;:195,&quot;bytes&quot;:18437,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://dennis-on-cybersecurity.cybercrucible.com/i/191610723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Kr8j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Kr8j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Kr8j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Kr8j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0854519c-62bf-4d1d-aa22-898b2064c15d_195x259.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[How to Netflix and Chill with your best employees]]></title><description><![CDATA[Until you learn what Netflix and Chill really means, then you hide in your office in shame.]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/how-to-netflix-and-chill-with-your</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/how-to-netflix-and-chill-with-your</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Wed, 08 Apr 2026 13:02:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Recently I learned that telling a couple engineers they can Netflix and Chill because they got their sprint done early, is not nearly the meaning I thought it was.  It was not the, &#8220;go ahead and have a beer, and call it a weekend early&#8221; that I thought it was. <br></p><p>I met my wife back when you used Blockbuster for DVD&#8217;s.  Do you remember the hybrid model, where you could go to the store, AND get DVDs delivered?<br>I&#8217;m not old, you are.<br><br>Anyway, I digress.<br><br>Accuracy in the language used in cybersecurity is honestly pretty frustrating.<br>It can't be the only industry where a marketing description of a product to be 100% right, and oh so, so, so wrong.<br>"We prevent the attack" can either be usually right, or usually wrong.<br>May the person with the most fireworks, models (male and female), jazz hands, and biggest marketing claims win.<br><br>The devil is, indeed, in the details. <br>Cybersecurity is also one of those really deep knowledge fields where, because consumers and engineers alike are walking on the shoulders of engineering giants, it is really easy for consumers and even technologists to really not have the time to figure out those details. Even when it really matters. Even when, in cybersecurity, a lot of that "research" is not really taught in schools (though that's better and improving now). Marketing analysts will, of course, for the right price tell the story that needs to be told as trusted advisors to end users trying to separate fact from fiction.<br>A bit like when I go to the doctor, to be honest.<br>I nod, knowingly, but I honestly am not a doctor (cue a Star Trek Bones references). I don't even play one on TV.<br><br>I remember a conversation with <a href="https://www.linkedin.com/in/gregfulk/">Greg Fulk</a>, former customer, current investor, who now has his own pretty cool company (check it out, seriously), having to talk about his own investigative journey before purchasing. Despite a busy schedule, he took time out of his day to unwind the layers of groupthink from the rest of the security vendor marketing (at least for endpoint-based security), and make an assessment for himself whether Cyber Crucible's different approach has merit or not.<br><br>Not everyone has the time or technical skill to do that.<br>Some are too busy being experts in keeping the Board happy, or at keeping the OT and IT teams from donning luchador masks every patch Tuesday.<br>And that's all right, because those are skills too.<br><br>I did speak to a guy once that tried to point out to a cadre of executives at a manufacturing company that they knew in detail every component's MTBF (Mean Time Before Failure) in their plant's operation, but clueless for the "nerdy" IT and security stuff.<br><br>I don't think that guy got a bunch of executives jumping up to ask questions about PKI, but I hear he made progress.<br>Rome wasn't built in a day.<br>Neither was <a href="https://www.linkedin.com/company/netflix/">Netflix</a>'s library.<br>And getting to the result you want in the end, after a bunch of effort, can be pretty chill.<br>Wait, no, that's not what I meant.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;e2b87267-0ec2-4f37-b215-cb5034c4ff35&quot;,&quot;duration&quot;:null}"></div><p></p>]]></content:encoded></item><item><title><![CDATA[Podcast: How to use AI to tell who is getting bonuses]]></title><description><![CDATA[The naughty or nice list just got a corporate makeover]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/podcast-how-to-use-ai-to-tell-who</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/podcast-how-to-use-ai-to-tell-who</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Mon, 06 Apr 2026 13:02:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>3 weeks ago &#8226; Edited &#8226; Visible to anyone on or off LinkedIn</p><p> I think everyone will enjoy this short little podcast.<br><br>Time to write this like AI.<br>&#8220;This is not a podcast by Dennis. It is an experience.&#8221;<br><br>Much like the time I ate at one of those fancy restaurants.<br>You know the type; the type you always leave hungry.<br><br>One of the experiences included must have resulted from a sale on organic beets, and the chef put a TON of beet foam on a couple of the dishes.<br>I assume beet foam was at one point beets, in what I would assume is some type of Hellraiser horror for vegetables everywhere.<br><br>Well, now I&#8217;m WAY off topic. Enough about beets.<br><br>This was recorded before the news about the Microsoft CoPilot snooping on Outlook inboxes more than it was supposed to.<br><br>That&#8217;s all I have to say about that.</p><p>https://epodcastnetwork.com/can-your-ai-tell-you-who-gets-bonuses-this-year</p>]]></content:encoded></item><item><title><![CDATA[You are in control of AI. Great. Wait. You aren't?]]></title><description><![CDATA[Much like driving on ice. You think you are in control, until you realize you aren't.]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/you-are-in-control-of-ai-great-wait</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/you-are-in-control-of-ai-great-wait</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Tue, 31 Mar 2026 13:02:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VcYc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Even though <a href="https://www.linkedin.com/company/cybercrucible/">Cyber Crucible, Inc.</a> spends a lot of its time in the cybersecurity world (not using AI to melt pig iron into steel), our buyers fit into two buckets:<br>1. They want preventative protection, and if AI is needed to do it, great.<br>2. They want their employees to use AI, but need the use to be managed appropriately.<br><br>Sometimes #2 is a bit out of a pragmatic acceptance that the employees will use it regardless (likely are...), and that its use might be a good thing eventually anyway.<br><br>The biggest challenge I see business owners have, and please share if you see differently, is that AI has really caused democratization of the availability of information. Barriers to communication flows and data sharing have really been broken down, when barriers were usually just focused on ease of access and consumption of the data.<br><br>That on itself sounds like a great thing, until you realize everyone now knows that you consume around $100 a month on Cheez Whiz.<br>Really Chad, with your blood pressure medicine?<br><br>Some of the folks we speak to of course are at the "can I control the darned thing" stage. Or they are at the "we're in complete control" stage, and they are about to have an "aha" moment and go back to the "can I control it?" phase.<br><br>Others have spent a lot of hard cash, blood, sweat, and tears to setup a private LLM.<br>Only to create a new human resources nightmare....<br>One company's leadership quietly disclosed that their private LLM had enough context to provide what the C-suite was very accurate guidance to employees asking questions like, "Is Deborah in accounting getting fired at the end of the year?" or, "Who is getting bonuses this quarter?"<br><br>I saw this rap battle cartoon (please check out the artist), and realized --&gt; This is exactly that situation in a cartoon. Brilliant. Mom's spaghetti, indeed!<br><br>So our conversations right now with <a href="https://www.linkedin.com/company/get-fortressai/">Get FortressAI</a> always focus on:<br>1. data a particular AI tool should not have access to at all<br>2. data that there should be controlled access (more on that later)<br>3. data that we (the company) won't heavily regulate, maybe Desktops, I don't know. (there are valid reasons for this...for another conversation)<br><br>Oh yeah, and you get to protect your credentials and hacker stuff too.<br>Just like buying a car, grandma might not know what ABS breaks are, but since they are in the package along with the airbag and the turbo, that sounds really great.<br><br>Seriously - go ahead and search for Twonks. Brilliant comics. Possibly not all HR compliant.<br>In case the comic makes no sense:<br>Cell one:  Man is telling his therapist his darkest most vulnerable moment.<br>Cell 3:  Man&#8217;s therapist, who knows all the things to make fun of him, is his challenger for a rap battle.<br><br>For more rap battle information, please watch the movie, 8 Mile.  Then rehearse Rap God until you can sing the entire thing from memory.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VcYc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VcYc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VcYc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VcYc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VcYc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VcYc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg" width="800" height="1000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:88086,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://dennis-on-cybersecurity.cybercrucible.com/i/191599499?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VcYc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VcYc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VcYc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VcYc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8e28b4e-564d-4fa2-9be3-6b2904321a75_800x1000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[Why is ransomware really a board level discussion?]]></title><description><![CDATA[A different take on the punditry. AKA, "listen to your wealth advisor"]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/why-is-ransomware-really-a-board</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/why-is-ransomware-really-a-board</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 27 Mar 2026 13:03:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The biggest evidence I see that ransomware attacks are a business and board level function, and not a technical function, comes from our customer base.<br>Not referrals or anything like that, although those are nice.<br><br>When enterprise leadership realizes prevention creates a tightly controlled dataflow, in which only Cyber Crucible "knows" about an attack, the business side and inside counsel becomes much more interested in keeping that information sealed up tight.<br>Words like whistleblowers, and ensuring properly vetted personnel have access to the data, become spoken of with more frequency.  That aligns really well with the business operations side, and talk of whistleblowers and stock value dips isn&#8217;t really a cybersecurity briefing topic (though it certainly influences it!).<br><br>Now that the myriad of cybersecurity analysts, and others, working really hard at their job, trying to keep up, don't need to have highly visible efforts....<br>risk looks a lot more private.<br><br>It reminds me of my days working with the military special forces folks - admittedly as a nerd, not as a Captain America re-enactment.<br>Information was kept on a need-to-know basis.<br>Heck, if I saw someone out and about the next city over, I didn't even say hello until I knew it was OK to do so.<br><br>Of course in business, "need to know" and the nomenclature around that is different.<br><br>I know some of you say, "that's my job, Dennis must not understand".<br>You, my brother in privacy, are the exception, not the rule.<br>There are a ton of companies that wish they could have that, especially during or after a ransomware attack.<br>We're lowering the bar, even though really the job is self-empowerment.<br><br>Though, I suppose the Right to Privacy really does have a lot to do with self-empowerment, doesn't it?</p><p>Check out this cool Forbes article by Danny Pehar, as a relevant topic.</p><p>https://www.forbes.com/councils/forbestechcouncil/2026/03/09/ransomware-in-2026-why-prevention-is-now-a-board-level-discipline-not-an-it-project/<br><br></p>]]></content:encoded></item><item><title><![CDATA[Until AI advertising gets it right]]></title><description><![CDATA[I think we're either very safe from from T-1000 assassins, or we're all collateral damage.]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/until-ai-advertising-gets-it-right</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/until-ai-advertising-gets-it-right</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 20 Mar 2026 16:45:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!j7kQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>My home network also has a teenage son, teenage daughter, and a wife.<br>Between the shared network, shared browsers, shared YouTube, television logged into my accounts, and whatever else is out there (Friendster chats?), I have quite the eclectic suggested content and ad feed.<br><br>You can usually tell what is me.<br>History, Star Wars, and DS9 stuff? Definitely me.<br>There are also these cool knot tutorials.<br>The knot people get me; that is AI working really well.<br><br>Then I get the Japanese cartoons, teenage heart throb stuff, and purses and such for the wife.<br>The emo phase seems to come and go, though it seems to be gone for now.<br>Which is a shame, because moving from a dress ad to a big hair band show was shocking and refreshing. <br>You know, back when men were men, strutting around in big hair, makeup, skin tight leggings, and platform shoes.<br>I don't know who any of these "famous?" people are nowadays.  I&#8217;m unimpressed.<br>Whatever happened to Ja Rule?  He knows what&#8217;s up.<br><br>There are two genres of threat hunting:<br>One, where you basically have no historical information to go on. If it has a funny hacker name or signatures in a database, then that's just chasing old thrift store or re-gifted malware. This is the sexy stuff, but it is a unicorn.<br><br>Then I see people use the term "threat hunting" for chasing stuff that has nice pretty threat intel documentation, IOCs (Indicators of Compromise - think, recipes for how to find the hacker based on their last victims), and known bad programs.<br><br>I don't throw shade at that type of "threat hunting", even though purists would call that chasing old stuff.<br>The fact that use case exists, and is valuable, demonstrates how bad the EDR/XDR alert model has become.<br>AI has a bright future here, I think.<br>The work of tracking down KNOWN attacks is drudgery, and overwhelming security teams.<br><br>Ironically, the biggest pressure I see hackers NOT implementing heavy automation is that wide scale criminal operations can still get by without implementing their own AI extensively.<br>If they are happy with lower revenue returns (aka, ransomware) with mediocre automation that gets caught 50% of the time, then why spend the money implementing more aggressive automation?<br>Also, you can realistically only extort someone so many times. Liquidity (or return to liquidity) represents the biggest speed brake on repeated ransomware attacks. It is all about the Benjamins.<br><br>Cyber Crucible is of course chasing a permanent solution with pre-emptive security that doesn't use signatures.<br>There is still an emerging market for just organizing all of the old attacks, as AI gets better.<br>But think of EDR/XDR vendors like gas lamps or the horse industry --&gt; neither were excited to see electric lamps or cars emerge, and both fought for market share as long as possible.<br>There is a strong market for just trying to make the EDR/XDR data more useful while those technologies are phased out or evolved, kicking and screaming.<br>Obviously ad-focused AI hasn't figured out I am not the person looking at boy bands or kpop (that is Korean Pop, for those without kids).<br>So cybersecurity AI analytics aren't going to do better for awhile, but there is absolutely value in horse and buggy accessories for a long time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j7kQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j7kQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg 424w, https://substackcdn.com/image/fetch/$s_!j7kQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg 848w, https://substackcdn.com/image/fetch/$s_!j7kQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!j7kQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j7kQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg" width="473" height="375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:375,&quot;width&quot;:473,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37779,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://dennis-on-cybersecurity.cybercrucible.com/i/191600191?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j7kQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg 424w, https://substackcdn.com/image/fetch/$s_!j7kQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg 848w, https://substackcdn.com/image/fetch/$s_!j7kQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!j7kQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddaf58ab-a1f0-4316-9cbe-e07b6be48aa4_473x375.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[Digital Signatures & Lent]]></title><description><![CDATA[One is bad for your cholesterol]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/digital-signatures-and-lent</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/digital-signatures-and-lent</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 20 Mar 2026 15:39:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!llxS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bb39521-8d48-48aa-bed2-b20f263db26a_1662x458.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It is Tech Friday. <br>Not as tasty as Lent Fish Fry Friday, but better for your cholesterol.<br><br>Let's talk about digital signatures for a moment.<br>I know it was where you already guessed I was going.<br><br>Quick introduction on digital signatures:<br>Companies that use software need a way to ensure the software they are running is the same software published by the software developer.<br>Digital signatures are the most common way of doing that.<br>Think of them like a that plastic seal around a bottle of medicine.<br><br>Both the programs themselves, and the libraries used, should realistically be digitally signed.<br>There are also mechanisms to do the signing properly.<br>It is a bit like <a href="https://www.linkedin.com/company/docusign/">Docusign</a> or <a href="https://www.linkedin.com/company/adobe-acrobat/">Adobe Acrobat</a> Sign.<br>If you see one signature that Docusign has verified, then another signature on the page that is definitely NOT verified by Docusign, then you have an unenforceable contract.<br><br>Same thing with programs.<br>Less so with software libraries - that seems to be a bit of a Wild West scenario. (Non-Americans, please watch the documentary Back to the Future Part 3 for information about the American Wild West.)<br>We've already caught major vendors, including 2 security companies, have issues here with faulty software deployments. Cringe.<br><br>So we have things signed.<br>There are two types of signatures, depending on the environment.<br>One is ye old digital signature security dudes and dudettes (collectively called "jabronis"), and the other is a protocol <a href="https://www.linkedin.com/company/microsoft/">Microsoft</a> created "back in the day" called Authenticode.<br>Think of Authenticode of the geekier, socially awkward person in your friend group. <br>If your response is, "we don't have one of those"; my brother in engineering, I have some news for you.<br><br><a href="https://www.linkedin.com/company/cybercrucible/">Cyber Crucible, Inc.</a> tracks these digital signatures, because there are certain programs our behavior models need to treat differently.<br>We still need to assess the programs, but need some tweaks while verifying no hackery was done. Or, if it wasn't it at least wasn't malicious.<br>The biggest category is the operating system itself.<br>We track <a href="https://www.linkedin.com/company/microsoft/">Microsoft</a> certificates very closely, because we need to closely interoperate with the OS.<br>So, when you see me comment like, "someone is having a bad day, we just saw over a dozen software releases in the past week", that's how we know.<br><br>Something you should never see in production environments, is this software digital signature from January signing your Windows software. We waited to ensure it wasn't around in Cyber Crucible customer spaces for a long enough period of time, but still redacted part of the hash.</p>
      <p>
          <a href="https://dennis-on-cybersecurity.cybercrucible.com/p/digital-signatures-and-lent">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Defending the New Digital Identity: ]]></title><description><![CDATA[Proactive Prevention of Key, Token, and Credential Theft]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/defending-the-new-digital-identity</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/defending-the-new-digital-identity</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 03 Oct 2025 13:36:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The current cybersecurity market is trapped in a reactive posture, betting on a human-driven response to machine-speed attacks. This groupthink is utterly failing to protect the most valuable asset in the modern enterprise: <strong>digital identity</strong>. Cyber Crucible asserts that to truly secure an organization, we must abandon the outdated, signature-based EDR/XDR models and embrace a preventative, autonomous defense that operates at the speed of the attacker.</p><h2>The Evolution of Online Identity</h2><p>The fundamental nature of online identity has changed. It is no longer a simple username and password. Modern digital identity is a constellation of cryptographically secured objects&#8212;keys, tokens, and credentials&#8212;stored directly on endpoints, representing a persistent and highly-privileged access to the entire enterprise ecosystem.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://dennis-on-cybersecurity.cybercrucible.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Dennis on Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Tokens: The New Digital Passport</h3><p>Legacy authentication methods, such as Basic Auth, required a user to send their actual username and password across the network for every single request. This practice significantly increased the risk of credentials being intercepted. <strong>OAuth</strong> (Open Authorization), the de facto standard, revolutionized this by introducing <strong>tokens</strong>.</p><p>The modern web application environment is powered by this token-based authorization. When a user first logs into a web application, their credentials are exchanged for an <strong>access token</strong> and often a <strong>refresh token</strong>.</p><ul><li><p>The <strong>access token</strong> is a unique, short-lived string of characters that acts as a digital passport, granting the client application permission to access specific resources on the user&#8217;s behalf.</p></li><li><p>The <strong>refresh token</strong> is a longer-lived secret used to obtain a new access token once the current one expires, ensuring continuous, seamless access without requiring the user to re-authenticate repeatedly.</p></li></ul><p>These tokens, which effectively bypass the password for day-to-day operations, are stored in local databases and files on the user&#8217;s machine by browsers, email clients, and desktop applications. Regardless of whether Multi-Factor Authentication (MFA) or biometrics are used for the initial login, the underlying communication method after that point is managed by these <strong>session tokens</strong> and <strong>refresh tokens</strong>. An attacker who steals an active token instantly bypasses every defensive measure deployed at the initial login stage.</p><h3>The Keys to the Kingdom: API, Private, and VPN Keys</h3><p>Beyond OAuth tokens, critical access is encapsulated in other cryptographic assets residing on the endpoint:</p><ul><li><p><strong>API Keys</strong> are unique codes that identify an application&#8217;s requests to a service&#8217;s API, acting like a specialized digital keycard that grants programmatic access to features or data. Exposure of an API key allows an attacker to make requests on the company&#8217;s behalf, leading to unexpected charges, data compromise, and service interruption.</p></li><li><p><strong>Private Keys</strong> are essential in asymmetric cryptography, providing the ability to decrypt data or sign requests. They are the ultimate secret and are used to establish encrypted connections, such as those used in a <strong>Virtual Private Network (VPN)</strong>. Stealing a VPN private key grants an attacker the ability to log in as an authorized user, bypassing the network perimeter and gaining access to internal resources.</p></li></ul><h3>Cryptowallets: Financial Identity on the Endpoint</h3><p>Cryptocurrency wallets that exist as applications on user machines are essentially the user&#8217;s <strong>financial identity</strong> in the digital economy. A wallet doesn&#8217;t physically hold the cryptocurrency; it securely stores the <strong>private keys</strong> used to authorize and sign transactions on the blockchain. The theft of these private keys is equivalent to having a physical safe&#8217;s combination, allowing the attacker to empty the associated digital assets, which can represent significant corporate or personal funds.</p><div><hr></div><h2>The Vulnerability: When Keys and Tokens are Stolen</h2><p>The theft of API keys, private keys, session tokens, and refresh tokens is the central vulnerability in the modern enterprise. While passwords still pose a risk, they are a one-time gate. In automated attacks, keys and tokens are the preferred target because they offer persistent, undetectable access. An attacker with a stolen, valid session token or VPN key is indistinguishable from an authorized user, rendering most boundary-based defenses obsolete. This stolen identity data provides a &#8220;legitimate&#8221; backdoor to the network that security teams struggle to detect for months.</p><div><hr></div><h2>Hacker Automation: The &#8220;Smash and Grab&#8221; Attack</h2><p>Modern cyber adversaries have replaced human-driven attacks with highly efficient, <strong>hyper-automated &#8220;smash and grab&#8221;</strong> operations. These are not methodical, long-term surveillance campaigns&#8212;they are blindingly fast data theft blitzes.</p><p>Automated attacks rely on predictable, <strong>known data points</strong> across all operating systems to maximize efficiency. The attacker&#8217;s pre-programmed tool doesn&#8217;t waste time analyzing a specific network; it is designed to go straight for universally-known locations:</p><ul><li><p><strong>User Profile and Desktop Locations</strong> (e.g., C:\Users\[Username]).</p></li><li><p><strong>Common Application Data Folders</strong> (where browsers and email clients store tokens and credentials).</p></li><li><p><strong>Standard VPN Key Locations</strong>.</p></li></ul><p>The automated tool&#8217;s primary goal is a <strong>Stage 1 smash and grab</strong>: targeting these known identity locations to instantly exfiltrate tokens, session cookies, and private keys&#8212;the &#8220;keys to the kingdom&#8221;. This provides an immediate return on investment and, more crucially, a persistent backdoor for a more lucrative, long-term data theft operation (Stage 2) later. The sheer speed of these scripts&#8212;infiltrating, collecting data, and self-deleting in a few seconds&#8212;makes human or even cloud-based detection and response an impossibility.</p><div><hr></div><h2><strong>The Impossibility of Reactive Identity Defense</strong></h2><p>Preventing credential and identity theft is paramount, but it poses a profound challenge to incumbent cybersecurity technologies. A reactive EDR/XDR tool, which sends data to a cloud-based SOC for analysis, is defeated by the latency of network communication and the biological latency of the human analyst. When an automated attack can steal an identity in under a second, a defense model that takes minutes or hours to respond is fundamentally broken. True defense must be <strong>purely preventative, kernel-level, and autonomous</strong>.</p><div><hr></div><h2><strong>Cyber Crucible: Autonomous, Kernel-Level Identity Prevention</strong></h2><p>Cyber Crucible challenges the flawed response-driven model by embedding autonomous, real-time protection directly into the endpoint&#8217;s kernel. Our defense is a direct counter to the hyper-automated threats, stopping the &#8220;smash and grab&#8221; before a single key or token is stolen.</p><h3><strong>Genetic AI-Powered Behavioral Modeling and Response</strong></h3><p>The core of Cyber Crucible&#8217;s identity protection is its patented <strong>Genetic AI-powered behavioral modeling and response engine</strong>. This technology operates at the deepest level of the operating system&#8212;the kernel&#8212;to provide a superhumanly fast decision-making process.</p><p>When any program attempts to access known identity theft and data theft entry points&#8212;the critical directories storing tokens, keys, and credentials:</p><ul><li><p><strong>Real-time Program and Library Integrity:</strong> Every program, even legitimate ones, and its supporting libraries are assessed for <strong>tampering in memory</strong> before access is allowed. This neutralizes fileless and in-memory injection attacks where malicious code hides inside a trusted process.</p></li><li><p><strong>Behavioral Modeling:</strong> Cyber Crucible&#8217;s AI engine instantly analyzes the process&#8217;s intent. It tracks the program&#8217;s parent-child relationships, memory behavior, and the target data location.</p></li><li><p><strong>Autonomous Decision and Interception:</strong> If a malicious behavioral pattern is detected&#8212;such as a non-browser process attempting to read a credential store&#8212;the system automatically intercepts and stops the program in <strong>under 200 milliseconds</strong>. This is a full, non-disruptive suspension of the malicious process, neutralizing the threat before any data is exfiltrated.</p></li></ul><h3><strong>Protecting Sensitive Data from Vendors</strong></h3><p>In a world where security products have become a data liability, Cyber Crucible operates with a focus on data sovereignty. While many security vendors may require or offer to upload sensitive identity data like private keys or session tokens to their hosted SOC teams, Cyber Crucible&#8217;s autonomous, edge-first design eliminates this risk. Known and verified programs, such as legitimate antivirus tools that pass the integrity assessment, are allowed to continue protecting their systems. However, Cyber Crucible&#8217;s core function is to locally and autonomously prevent the malicious <em>access</em> to identity data, ensuring that sensitive assets never leave the secure boundary of the endpoint or are exposed to the control of a third-party vendor. This ensures true <strong>quiet security</strong> and <strong>complete control</strong> for the customer.</p><p>Cyber Crucible is the necessary evolution from reactive analysis to autonomous prevention. The future of cybersecurity is not forensic; it&#8217;s prevention.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://dennis-on-cybersecurity.cybercrucible.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Dennis on Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Persistence Problem in Non-Windows Security]]></title><description><![CDATA[Non-Windows operating systems are sometimes LESS secure]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/the-persistence-problem-in-non-windows</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/the-persistence-problem-in-non-windows</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 26 Sep 2025 11:31:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Securing Linux, UNIX, and macOS operating systems presents a unique set of challenges rooted in their open and flexible design. While this architecture promotes collaboration and innovation, it also creates inherent vulnerabilities that can be exploited by a determined attacker. This whitepaper discusses these challenges, focusing on the fundamental problem of persistence and the fragility of security agents against a root-level compromise.</p><div><hr></div><h3>The Open Architecture Paradox &#129309;</h3><p>The operating systems in the Linux, UNIX, and macOS family are built on a foundation of open, modular design. This philosophy, originating from UNIX, encourages transparency and community-driven development. Linux, in particular, thrives on its open-source model, allowing developers and security researchers to inspect and contribute to the source code. This open nature, while beneficial for rapid bug fixes and feature development, gives attackers the same level of visibility into the system's inner workings. They can study the code to find vulnerabilities and anticipate how security tools will function, making them more effective at bypassing defenses.</p><div><hr></div><h3>The Insufficiency of User-Level Tools &#129520;</h3><p>Many cybersecurity agents operate at the <strong>user level</strong>. They are applications that run on the system and, as such, are subject to the same permissions and limitations as any other program. An attacker who gains administrative privileges can easily terminate, suspend, or modify these tools. For example, a malicious actor with <code>sudo</code> access can simply use <code>kill -9</code> to stop a security agent's process. These tools are valuable for general threat detection but are fundamentally vulnerable to a targeted, privileged attack.</p><p><strong>Kernel modules</strong>, in contrast, operate with the highest level of privilege in <strong>kernel space</strong> (Ring 0). They have direct, unimpeded access to all system functions and data. This allows them to monitor and control processes, file systems, and network traffic with a level of granularity and efficiency that user-level tools cannot. However, even these powerful modules are not immune to attack.</p><div><hr></div><h3>The Fragility of Kernel Modules &#128165;</h3><p>By default, security kernel modules can be unloaded from a running system. A malicious actor with <code>sudo</code> or <strong>root</strong> access can simply use commands like <code>rmmod</code> to remove a security module. This action effectively disables the most powerful layer of the security agent's defense, leaving the system exposed. This is a critical flaw: the most effective tools for protecting a system can be easily deactivated by the very adversary they are designed to stop.</p><div><hr></div><h3>The Limits of Mandatory Access Controls (MACs) &#128272;</h3><p>To address this issue, operating systems employ <strong>Mandatory Access Control (MAC)</strong> policies, such as <strong>SELinux</strong> and <strong>AppArmor</strong>. These frameworks enforce a system-wide, kernel-level access policy that is designed to be more secure than the standard Discretionary Access Control (DAC) model. A MAC policy can, for example, prevent a root user from unloading a specific security kernel module. This seems like a robust solution, but there's a catch.</p><p>The very mechanism that provides this protection can be disabled by a user with <strong>root</strong> access. A malicious actor with elevated privileges can simply turn off the MAC policy (e.g., using <code>sudo setenforce 0</code> on a system with SELinux), then proceed to unload the security module. This means there is no solid, inherent manner to prevent a malicious actor with root access from disabling security kernel modules on these systems.</p><div><hr></div><h3>Attacker Tradecraft: A Calculated Bypass &#128373;&#65039;&#8205;&#9794;&#65039;</h3><p>A modern attacker's tradecraft on a non-Windows system would be highly automated and methodical, designed to disable security controls in a specific order:</p><ol><li><p><strong>Disable User-Level Tools:</strong> The attacker, having gained initial access, would first use scripts to identify and terminate any user-level security processes. They might search for known process names, then use <code>killall</code> or <code>pkill</code> to remove them from memory.</p></li><li><p><strong>Disable MAC Policies:</strong> With user-level agents neutralized, the attacker would then escalate privileges to root and disable any active MAC policy. This is often a single command, making it a quick and effective way to remove a major barrier to their next step.</p></li><li><p><strong>Unload Kernel Modules:</strong> Finally, with the MAC policy disabled, the attacker would use <code>rmmod</code> to unload the security kernel module. The system is now fully exposed, allowing the attacker to establish persistence, exfiltrate data, and execute their full attack without a major security agent to stop them.</p></li></ol><p>This automated, multi-stage process highlights the central challenge: the very tools meant to protect the system can be leveraged against themselves.</p><div><hr></div><h3>The Cyber Crucible Angle: A Call for a New Approach</h3><p>Cyber Crucible has successfully replicated all of its key functionalities for Windows products on non-Windows operating systems. This includes advanced behavioral analysis, memory introspection, and real-time in-memory analysis of libraries like <strong>shared objects</strong> (the non-Windows equivalent of a Windows DLL).</p><p>We recognize that most enterprise attacks begin on Windows and then use stolen credentials to migrate to other systems, especially virtualization management portals like <strong>vCenter</strong>, <strong>Veeam</strong>, or <strong>Hyper-V</strong>. While our existing identity theft prevention capabilities largely mitigate this risk, a robust non-Windows capability would be valuable for catching insider threats or attackers who already have access to these highly sensitive administrative portals.</p><p>However, a critical conversation must be had within the non-Windows security community: the <strong>persistence issue</strong>. The fact that a security tool can simply be turned off by an attacker who gains root access is a glaring hole in risk management. Our Microsoft product is designed to be ultra-resilient and is often the last security tool running on a compromised system. We cannot, in good faith, deploy a non-Windows tool with the same expectations of resilience and dependability, knowing it can be so easily disabled.</p><p>Currently, our research and development teams are working to address this fundamental problem of persistence and build the level of resilience our customers expect. Until then, the Cyber Crucible team recommends that organizations limit access to non-Windows machines as much as possible, as no security tool can truly provide the necessary protection until this critical issue is resolved.</p>]]></content:encoded></item><item><title><![CDATA[The Invisible Intruder: The Fusion of Remote Access Tools and Hacker Automation]]></title><description><![CDATA[How not to feed white-hat researchers all your stolen data, or if you aren't a criminal...why isn't my malware sample trying to steal any data?]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/the-invisible-intruder-the-fusion</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/the-invisible-intruder-the-fusion</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 19 Sep 2025 11:30:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>Introduction</strong></h2><p>The modern cybersecurity threat landscape is defined by its speed and autonomy. While ransomware has traditionally been the headline-grabbing threat, a more insidious and sophisticated form of attack is emerging: the fusion of remote access tools (RATs) with hacker automation. This white paper will explore how attackers are leveraging pre-built surveillance and theft capabilities within remote access tools to conduct completely autonomous operations. It will contrast the network dependencies of these attacks with the more self-sufficient nature of ransomware and detail the new hybrid methodologies attackers are employing to achieve both rapid and long-term data theft.</p><div><hr></div><h2><strong>The Evolution of Remote Access Tools as an Attack Vector</strong></h2>
      <p>
          <a href="https://dennis-on-cybersecurity.cybercrucible.com/p/the-invisible-intruder-the-fusion">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Unseen Hand: Understanding and Countering the Threat of Hacker Automation]]></title><description><![CDATA[This ain't your dad's hackers]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/the-unseen-hand-understanding-and</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/the-unseen-hand-understanding-and</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 12 Sep 2025 11:31:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BeYq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36ab3f2f-4efe-4a64-838a-fa00f8c46855_956x956.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>Introduction</strong></h2><p>The cybersecurity landscape is in a state of continuous evolution, but perhaps no trend is as transformative and dangerous as the rise of <strong>hacker automation</strong>. Once a domain of manual, human-driven attacks, cybercrime has shifted into a hyper-efficient, machine-speed operation. This white paper explores the evolution of hacker automation, from its early roots in simple scripts to today's sophisticated, AI-powered "smash and grab" attacks. It will detail the specific tactics that make these automated attacks so effective, the critical vulnerabilities they exploit, and the necessary paradigm shift in defense strategies required to combat them.</p><div><hr></div><h2></h2><h2><strong>The Evolution of Cyberattacks: From Manual to Automated</strong></h2>
      <p>
          <a href="https://dennis-on-cybersecurity.cybercrucible.com/p/the-unseen-hand-understanding-and">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Whitepaper: The Technical and Business Failures of Ransomware Key Capture Defense ]]></title><description><![CDATA[Been There. Done That. Am I too young to write my memoirs on the matter?]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/whitepaper-the-technical-and-business</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/whitepaper-the-technical-and-business</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Fri, 05 Sep 2025 11:31:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/pfEq6GKjOkY" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Ransomware defense that relies on capturing encryption keys has been both a technically invalid strategy since 2021 and an unsound business risk strategy from the start. A truly effective defense must focus on the entire attack lifecycle, not just the final act of encryption.</p>
      <p>
          <a href="https://dennis-on-cybersecurity.cybercrucible.com/p/whitepaper-the-technical-and-business">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Evolution of AI in Cybersecurity: From Herd Defense to Intelligent Protection]]></title><description><![CDATA[The Herd Defense Model: A Reactive Past]]></description><link>https://dennis-on-cybersecurity.cybercrucible.com/p/the-evolution-of-ai-in-cybersecurity</link><guid isPermaLink="false">https://dennis-on-cybersecurity.cybercrucible.com/p/the-evolution-of-ai-in-cybersecurity</guid><dc:creator><![CDATA[Dennis Underwood]]></dc:creator><pubDate>Mon, 01 Sep 2025 21:15:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ACu7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>The Herd Defense Model: A Reactive Past</strong></h3><p>For much of the last decade, cybersecurity was defined by the <strong>herd defense</strong> model, a concept central to early <strong>Endpoint Detection and Response (EDR)</strong> and <strong>Extended Detection and Response (XDR)</strong> solutions. This approach was built on the assumption that cybercriminals' methods would evolve slowly enough for security vendors to respond. The strategy was to analyze a new attack after it had successfully compromised a small number of victims, then rapidly deploy a countermeasure to protect the wider customer base. This meant that there was always an unfortunate <strong>"control group" of victims</strong> every time a criminal organization mutated its attacks. The model, while intended to protect the greater good, was inherently reactive.</p><p>The effectiveness of this model began to wane as the pace of new exploits and automated attack tool mutations accelerated. The telemetry collected from endpoints and networks, once a valuable source of actionable intelligence, became a tidal wave of ambiguous data. This "less definitive smoking gun" telemetry was often the only evidence of an attack, and it was typically discovered long after the compromise had already occurred.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://dennis-on-cybersecurity.cybercrucible.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Dennis on Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Both customers and security companies were now <strong>drowning in a sea of data</strong>. For customers, hiring the multitude of specially trained security analysts required to sort through this volume of data was financially unfeasible. For security companies, while they could afford to hire analysts, the challenge was no less daunting. This situation is perfectly captured by a non-cybersecurity analogy: the factory floor of Veruca Salt's father in <em>Willy Wonka and the Chocolate Factory</em>. Mr. Salt's workers were tasked with a Herculean effort, opening countless chocolate bars in a relentless quest to find a single Golden Ticket. Similarly, in cybersecurity, companies hired expensive analysts to sort through endless data, a Sisyphean task of interpreting logs and alerts to find a hacker.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ACu7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ACu7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!ACu7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!ACu7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!ACu7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ACu7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1565744,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://dennisunderwoodoncybersecurity.substack.com/i/172518491?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ACu7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!ACu7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!ACu7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!ACu7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfe936e4-35e5-4377-8399-d8bd7327169d_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Human analysts were constantly losing this battle. The sheer volume of <strong>incomplete data, false positives</strong>, and ambiguous indicators led to an overwhelming sense of "alert fatigue." In this environment, attackers continued to gain victims using traditional methods, as the herd defense model could not keep up with the speed of their automated mutations. The "control group of victims" versus the "protected members of the herd" had grown to the point where every EDR customer was always in the control group, always a potential victim of whatever new attack the criminals&#8217; automated mutations conjured up next.</p><div><hr></div><h3><strong>The Disruptive Force of Artificial Intelligence</strong></h3><p>Artificial intelligence emerged as the only viable solution to process and correlate these immense volumes of data. However, the introduction of a disruptive technology that requires a dramatic change in methodology is never seamless. Consider the shift from the <strong>horse and buggy to the internal combustion engine</strong>. For companies and innovators, a new technology presents a triple challenge: commercialization, market adoption, and overcoming resistance from incumbents.</p><p>Market incumbents, with established revenue streams based on the old ways of doing business, are often the most resistant to change. They may see the new technology as a risk to their existing business model and may even invest in startups to gain inside knowledge or acquire them on favorable terms, all to control or thwart the disruption. Beyond capitalism, the commercialization of a new technology is an evolutionary process itself, with unexpected successes and failures as society and commerce learn to adapt.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZUP6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZUP6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ZUP6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ZUP6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ZUP6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZUP6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1877502,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://dennisunderwoodoncybersecurity.substack.com/i/172518491?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZUP6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ZUP6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ZUP6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ZUP6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2058d4cb-ca0a-40bf-97fb-beec61eab47f_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In cybersecurity, it was only natural that the market, dominated by overworked analysts, would first use AI to <strong>amplify the existing human-driven approach</strong>. This is the equivalent of Veruca Salt's father adding <strong>robotic arms to his factory workers</strong> to help them open chocolate bars faster. This incremental use of technology is beneficial&#8212;it can reduce analyst fatigue and improve efficiency&#8212;but it is still constrained by the underlying, flawed operational model. It's an improvement, but not a revolution. AI offers a myriad of new ways to approach the challenge of offense and defense, but simply stapling it onto the herd defense model prevents it from reaching its full potential.</p><div><hr></div><h3><strong>Cyber Crucible and the Genetic AI Revolution</strong></h3><p>Cyber Crucible's innovation lies in its complete departure from the herd defense concept. It leverages <strong>genetic AI algorithms</strong> to create a new way of approaching cyber defense&#8212;one that is proactive and resilient to the continuous mutations of attacker tools. This is not about building a larger factory floor to hold more box-opening employees; it&#8217;s about a completely different operational method.</p><p>This shift is the difference between adding robotic arms to the workers on the factory floor and inventing an entirely new machine: an <strong>x-ray machine to scan every chocolate bar instantly</strong>, looking for the unique shape of the Golden Ticket without ever having to open the box.</p><p>Genetic AI allows Cyber Crucible to move beyond analyzing known attack patterns among a control group of victims. Instead, it creates a robust, resource efficient system that can assess the fundamental nature of hacker actions. Just like the x-ray machine, Cyber Crucible first had to invent multiple new sources of data that could provide the right information at the right time, resilient to hacker attempts to blind the sensors. The right data, at the right time, to the right decision model allows for proactive defense that can anticipate and neutralize threats even when they are brand new and have no known signature. By breaking out of the herd defense mentality, Cyber Crucible provides a new paradigm for cybersecurity that eliminates the need for a "control group of victims" and provides a truly proactive defense against a constantly mutating threat landscape.</p><p>Cyber Crucible was undoubtedly building an AI-infused cybersecurity product before AI was &#8220;cool&#8221;. Certainly, its development was built off decades of effort and research from a multitude of projects and academic research. Perhaps it stands as the first cybersecurity product to embrace a new method of defense orthogonal to herd defense type strategies. In 2025, with a stream of new AI-wielding cybersecurity companies emerging which use artificial intelligence as a robotic arm for the security analyst, Cyber Crucible may be the only company separating from the legacy tradecraft.</p><p>Cyber Crucible&#8217;s corporate agenda is focused on customer empowerment, transparency, integrity, and &#8220;making cybersecurity boring&#8221; through the use of new artificial intelligence advancements. The future is bright for the Company and its customers, as it can now focus on using new use cases for artificial intelligence and associated technologies to achieve their life and corporate goals now that AI by the good guys is winning against AI in use by the criminals.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://dennis-on-cybersecurity.cybercrucible.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Dennis on Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>