top of page



Physical Access Is Still the Fastest Path to Domain Admin
Three hours. That's how long it took to go from standing outside a data center fence to dumping domain credentials from a VSS shadow copy. Not three days. Not three weeks of patient phishing campaigns and careful lateral movement. Three hours, start to finish, in broad daylight. The Setup A client hired us for a physical target assessment of a remote data center. The engagement included a network penetration test component, but with a catch—we only got to touch the network if
Keith Pachulski
4 days ago15 min read


Heads Down in the Trenches: Tool Development and End-of-Year Offensive Work
It's been a few weeks since my last post. I've been busy. The end of the year always seems to get us. Organizations are scrambling to close out projects that have been lingering for months, budgets are coming to a close, and with that comes an influx of high-priority, short-notice work. Sleep becomes optional. Most of my time has been spent on offensive technical work: external / internal penetration tests and public-facing web application testing. With that comes tool develo
Keith Pachulski
Dec 20, 202511 min read


The Burnout Blueprint: How Security Teams Self-Destruct (And Why Leadership Lets It Happen)
I found this list a few months back while doing disaster operations training. I volunteer with the American Red Cross as a State Relations Disaster Liaison; it's what I do when I'm not doing security work. Some of the training material had this piece of dark satire buried in it, probably aimed at disaster responders or emergency workers. I wish I could remember where exactly it came from so I could credit whoever wrote it. Here's why it stuck with me: I read through it and re
Keith Pachulski
Oct 23, 20254 min read


Your Red Team and Blue Team Don't Talk. That's Why You Keep Getting Breached.
Last week I watched something that happens constantly in our industry. A client's blue team was investigating suspicious traffic. Nothing crazy—just odd patterns in their Splunk. Meanwhile, their red team was two floors up running a pentest using the exact same techniques the blue team was tracking. Nobody told anyone. The teams don't talk. Real attackers don't work in silos. They run automated recon, exploit vulnerabilities in real-time and adapt to your defenses faster than
Keith Pachulski
Oct 14, 202511 min read


Cybersecurity Threat Intelligence Requirements Framework: IRs, PIRs, and SIRs
The threat intelligence lifecycle begins with defining what information you actually need to collect. Intelligence Requirements form a...
Keith Pachulski
Sep 17, 202519 min read


Most Small Business Owners Are Flying Blind (And It's Killing Them)
I'm stepping away from my usual security-focused content today to address something dire that affects every small business owner -...
Keith Pachulski
Sep 9, 202510 min read


The AI Arms Race: Why Attackers Are Already Winning (And How to Catch Up)
Last week, I was sitting across from a CISO at a Fortune 500 company when he said something that made me pause: "We're just starting to...
Keith Pachulski
Sep 8, 202510 min read


The Small Business Cybersecurity Survival Guide
A practical guide for protecting your business without breaking the bank or hiring an IT team Your Business Is More Vulnerable Than You...
Keith Pachulski
Aug 29, 202511 min read


Small Business Cybersecurity Implementation Checklist
90-Day Roadmap with NIST Cybersecurity Framework Maturity Assessment Company Name: _____________________ Assessment Date:...
Keith Pachulski
Aug 29, 20258 min read


Highlands Oncology Group - When Security Fixes Fail
When you look at what happened to Highlands Oncology Group, you're seeing a textbook example of how security failures compound over time....
Keith Pachulski
Aug 18, 20258 min read


Defending Against RF Reconnaissance - Why Detection is Critical for Modern COMSEC Programs
Radio frequency scanning has long been a cornerstone of signals intelligence operations, from World War II codebreaking efforts to modern...
Keith Pachulski
Aug 3, 202510 min read


When Energy Meets Instability: The Total Security Challenge in Mozambique's $20 Billion LNG Restart
I've been watching the energy security space for years, but this week's news from Mozambique caught my attention in a way that should...
Keith Pachulski
Jul 26, 20256 min read


The Theater of Physical Security: What Indonesia Teaches Us About Real vs. Perceived Protection
We're in Indonesia again for a few weeks doing some work as well as getting some much-needed R&R. While the archipelago nation offers...
Keith Pachulski
Jul 13, 20259 min read


Lessons in Sunburn, Surveillance, and Security Gaps
Over the last few weeks, we’ve been off the radar—but for good reason. Our team was deep in Latin America conducting forced entry...
Keith Pachulski
Jun 19, 202520 min read


Why IT Shouldn't Own Physical Security: A Risk-Based Perspective
Recently, Verkada—a major player in cloud-based surveillance and access control—asserted that IT departments should own physical...
Keith Pachulski
May 30, 202511 min read


Weimar+ - Europe's Strategic Pivot and What It Means for U.S. Companies
European powers are making their intentions clear. Over the past few days, something significant has taken shape across the Atlantic: the...
Keith Pachulski
May 27, 20254 min read


Strengthening Physical Security Standards in Data Centers
We didn’t have a plan—but honestly, it's hard to plan for these things when you get the target location address only 24 hours before...
Keith Pachulski
May 21, 20255 min read


EU Doubles Down on Cyber Sanctions - What It Means for Global Cybersecurity Operations
On May 12, 2025, the European Council formally extended its cyber sanctions regime through May 18, 2028. This move reinforces the EU’s...
Keith Pachulski
May 12, 20258 min read


Introducing Sidikjari: Metadata Extraction for Cybersecurity Professionals
Introducing Sidikjari: Advanced Metadata Extraction for Cybersecurity Professionals Metadata analysis is a crucial part of security...
Keith Pachulski
May 9, 20253 min read


macchanger
🧙♂️ Introducing macchanger: Finally, a MAC Spoofing Tool That Works on Windows 11 Spoiler : Yes, we know the name’s been used before....
Keith Pachulski
May 5, 20253 min read
bottom of page



