
Sukant Kumar
I converse about people, processes, and technology within cyber security. Passionate Threat Intelligence Researcher specializing in OSINT and SOCMINT.

The Evolution of C2: Centralized to On-Chain
How C2 moved from centralized servers to blockchain contracts. Resilience, trade-offs, real cases, and practical detection via RPC filtering and on-chain analysis.
December 12, 2025
→
When Patches Fail: An Analysis of Patch Bypass and Incomplete Security
Patches fix bugs, not always the attack. This article shows how fixes get bypassed — and what quick checks defenders should run after updates.
October 17, 2025
→
Proactive Threat Hunting: Techniques to Identify Malicious Infrastructure
Learn how to hunt malicious infrastructure using SSL certs, favicons, HTTP headers, JARM, and IoT search engines like Netlas, Shodan, and Censys.
July 30, 2025
→





