Cyber Blog

This blog is evolving into a broader space for my cybersecurity journey. While I’ll continue to share detailed walkthroughs from platforms like KC7, I’ll also be posting about tools I’m exploring, concepts I’m learning, projects I’m building, and insights from real-world research and coursework. Whether it’s a deep dive into threat hunting techniques or reflections on industry trends, this site serves as a growing archive of my hands-on experience and continuous learning in cybersecurity.

Threat Intelligence Report - Lazarus Group

James | 30 April 2025

For my final project for IS 5800 we were required to write a six page Threat Intelligence Report. Below is the summarized version while the full report can be found here:

read more

ACH - XZ Backdoor

James | 18 April 2025

Who Was Behind the XZ Backdoor? A Threat Attribution Exercise Using ACH Recently in class, Alex (classmate) and I worked on a threat attribution excersice using the Analysis of Competing Hypotheses (ACH) method. The focus? One of the most intriguing real-world incidents of 2024: the XZ backdoor — a stealthy supply chain compromise that could have impacted countless Linux systems worldwide.

read more