
Sukant Kumar
I converse about people, processes, and technology within cyber security. Passionate Threat Intelligence Researcher specializing in OSINT and SOCMINT.

Telegram Bot API Abuse
How threat actors abuse Telegram Bot API for phishing, telemetry, and malware delivery. Hunting techniques and case studies.
April 16, 2026
→
Proactive Threat Hunting: Techniques to Identify Malicious Infrastructure
Learn how to hunt malicious infrastructure using SSL certs, favicons, HTTP headers, JARM, and IoT search engines like Netlas, Shodan, and Censys.
March 17, 2026
→
Top 10 Critical Threat Actors to Watch in 2026: Ransomware, APTs & Defensive Strategies
2026 threat landscape: 10 top ransomware, APT and extortion groups. TTPs, resilience after takedowns, and defenses: patching, identity, backups, detection.
January 23, 2026
→
The Evolution of C2: Centralized to On-Chain
How C2 moved from centralized servers to blockchain contracts. Resilience, trade-offs, real cases, and practical detection via RPC filtering and on-chain analysis.
December 12, 2025
→
When Patches Fail: An Analysis of Patch Bypass and Incomplete Security
Patches fix bugs, not always the attack. This article shows how fixes get bypassed — and what quick checks defenders should run after updates.
October 17, 2025
→






