
Risky Context
425 subscribers
About Risky Context
At the intersection of pentesting, auditing, and risk assessment. A bit of all that is infosec.
Similar Channels
Swipe to see more
Posts

The free preview to my member only post now lists two thought provoking articles on future of work and cybersecurity. https://sripati.info/how-to-get-job-as-entry-level-candidate-in-cybersecurity/

Security researchers Karan Sajnani and Jaden Furtado share details of their assignment to hack into (well, conduct a security audit of) power plant infrastructure. One car, four hackers, twelve days - and some insights from the journey (including photos). They presented it in a conference. Video link below. Nice watch. https://m.youtube.com/watch?v=4HchTam8e2A

Updated post - https://sripati.info/6-elements-that-every-pentest-report-must-have/

Time to share the below article with your SOC vendor and confirm whether, 1. Alerts are configured to detect each type of attack mentioned? 2. threat hunting happens keeping these attacks as hypothesis?, and 3. whether outcome of points 1 and 2 above are being reported in periodic status calls? In case of a regulated entity in India (like a bank), outsourcing an activity doesn’t absolve the entity’s responsibility. Regulators expect and check the depth of oversight by entity on their vendor. Good article, worth reading and acting upon. https://vincent03dinh.wordpress.com/2025/04/24/active-directory-detection-engineering-notes/

If you remove your kindle mobile app after reading this book, it will be an apt response to the lessons gleaned from it. An excerpt - Privacy is about being able to keep certain intimate things to yourself – your thoughts, your experiences, your conversations, your plans. Human beings need privacy to be able to unwind from the burden of being with other people. We need privacy to explore new ideas freely, to make up our own minds. Privacy protects us from unwanted pressures and abuses of power. We need it to be autonomous individuals, and for democracies to function well we need citizens to be autonomous.

Buy this book. Kindle version costs INR 265. Excellent book, tight writing. Must read.


One more on how to leverage AI in coding https://open.substack.com/pub/mtrajan/p/ai-dev-tools-co-pilot-paradox

David Bombal is a world class author and instructor on networking. He has published a post on LinkedIn, showing his experiment with DeepSeek from data leakage perspective. Good watch. https://www.linkedin.com/posts/davidbombal_deepseek-ai-privacy-ugcPost-7292599628120637441-SsrN

One thing that I see common in both articles - AI can amplify existing abilities. But only if we know what we are doing, and can instruct AI succinctly. If I am good, it can help me project myself as better. But if I am not good, it can’t make me good. How is this visible? Here’s how. English is the programming language for AI. The more succinct we are, better the output will be.

Saw a beautiful discussion on LinkedIn on risks related to public Wi-Fi (or lack thereof). Buried in comments, is a blog post on the same. Here’s the blog post - https://thecontractor.io/nine-words/ Here’s the LinkedIn post, read through the comments. Good food for thought for us all - https://www.linkedin.com/posts/bucsayb_hot-take-public-wifi-isnt-going-to-get-activity-7292102019165671424-3mLM