Smith3dxFortifying Synergy: Securing the Integration of Blockchain and AIIntroduction3 min read·May 29, 2023----
Smith3dxSunburst — A Solar winds supply chain attackA SolarWinds Supply Chain Attack: Unveiling the Technicalities of a Devastating Breach4 min read·May 14, 2023----
Smith3dxInterview with Veteran Hacker/Bug Bounty Hunter — Meet Jasmin LandryThe word hacker has been associated with negativity and anyone with a hoodie and a laptop is seen as a criminal. though there have been…8 min read·Jun 22, 2022----
Smith3dxInterview with a FANG Security Engineer — Meet Gynvael ColdwindToday I start a series, where i interview leading Cyber Security Professionals in the industry. Cyber Security in recent years has become…6 min read·Mar 24, 2022----
Smith3dxBlockchain SecurityIf you ever wanted to understand Blockchain security, here is a breakdown of everything blockchain, the types of Blockchain Public vs…15 min read·Mar 11, 2022----
Smith3dxRed Teaming — Think like your enemyFrom my adventures as a security researcher, i have come across the term Red Team. Lately, I have been looking into going into red teaming…2 min read·Mar 13, 2021----
Smith3dxNewbie Security Researcher toolsIt has been three months; I have used a lot of tools and I think I am settling for a set of tools as my goto hunting tools. One thing that…4 min read·Oct 26, 2020--1--1
Smith3dxNewbie bug bounty hunter recon methodologyRecon short for reconnaissance is defined as the exploration of an area to gain information on a target. When it comes to Bug bounty recon…3 min read·Oct 20, 2020----
Smith3dxThree Months as a Bug Bounty hunter/HackerJuly 2020 at the height of the global pandemic, I took an interest in Bug bounty. I have been into information technology for over 10…4 min read·Oct 10, 2020----