top of page

Profile

Join date: Feb 24, 2025

Posts (35)

Jan 9, 20266 min
Living off the Land Attacks (LotL): When Hackers Use Your Tools Against You
SHILPI MONDAL| DATE: JANUARY 09 ,2026 We used to worry about "files." In the old days and by that, I mean just a few years ago defense was largely about spotting the anomaly on the disk. A strange .exe, a malicious payload, a signature that didn't match the known good. But the game has changed entirely. Why would an attacker spend time and money developing custom malware that might get flagged by your antivirus when they can simply use the tools you’ve already paid for, installed, and...

3
0
1
Jan 8, 20267 min
Post-Quantum Cryptography: Is Your Data Ready for the “Harvest Now” Threat?
SHILPI MONDAL| DATE: JANUARY 08, 2026 The Quantum Clock is Ticking Louder Than You Think Imagine a burglar who can’t pick your safe today, so they simply steal the entire safe and wait for a better drill to be invented. This isn't a hypothetical scenario; it is the exact reality of the "Harvest Now, Decrypt Later" (HNDL) threat facing enterprise data right now. With recent breakthroughs pushing us closer to fault-tolerant quantum computing, the "theoretical" risk has officially graduated to a...

8
0
1
Jan 2, 20265 min
The Growing Threat of OAuth Token Abuse
SHILPI MONDAL| DATE: JANUARY 02 ,2026 Remember when a strong firewall and a complex password meant a good night's sleep? Those days are gone. We’ve seen a fundamental shift in how adversaries operate, moving away from banging on the digital front door of hardware perimeters to quietly subverting the very identity frameworks we rely on for "seamless" connectivity.   At the heart of this shift is the OAuth 2.0 protocol. It’s the ubiquitous plumbing for our SaaS integrations, the magic behind...

4
0
1
bottom of page