
Sukant Kumar
I converse about people, processes, and technology within cyber security. Passionate Threat Intelligence Researcher specializing in OSINT and SOCMINT.

Top 10 Critical Threat Actors to Watch in 2026: Ransomware, APTs & Defensive Strategies
2026 threat landscape: 10 top ransomware, APT and extortion groups. TTPs, resilience after takedowns, and defenses: patching, identity, backups, detection.
January 23, 2026
→
The Evolution of C2: Centralized to On-Chain
How C2 moved from centralized servers to blockchain contracts. Resilience, trade-offs, real cases, and practical detection via RPC filtering and on-chain analysis.
December 12, 2025
→
When Patches Fail: An Analysis of Patch Bypass and Incomplete Security
Patches fix bugs, not always the attack. This article shows how fixes get bypassed — and what quick checks defenders should run after updates.
October 17, 2025
→
Proactive Threat Hunting: Techniques to Identify Malicious Infrastructure
Learn how to hunt malicious infrastructure using SSL certs, favicons, HTTP headers, JARM, and IoT search engines like Netlas, Shodan, and Censys.
July 30, 2025
→






