Iftiaj Alom If Hackers Wrote Company Rules. Hacker do not care how friendly the company culture is. Hacker do not care how many awards the business won. Hacker only care about one thing. Can I break you? That question changes everything. Most c...
Iftiaj Alom The Attack Didn’t Start on-Chain. It Started on a Laptop. A few months ago, a Web3 startup shared a painful story. One of their developers lost access to his laptop during a trip. Nothing dramatic. Just a misplaced bag at an airport. At first, the team wasn’... Cybersecurity
Iftiaj Alom How Attackers Learn About You Without Hacking One afternoon, a tech lead from a growing company received an email from a stranger. The message was short: “Nice test environment at test-admin.yourcompany.com. You might want to fix those outdated s... Cybersecurity
Iftiaj Alom The Hidden Cost That Quietly Kills Profit in Government Projects Today, I spoke with a vendor who had just won a government tender in Singapore. He sounded excited at first. Then his tone shifted. They had discovered a long list of cybersecurity compliance requirem... Cybersecurity
Iftiaj Alom So… You Got a Tender and Saw: DAST, SAST, VAPT, SSAT, SSCT. Now What? A few weeks ago, a vendor messaged me in a mild panic. They had just won a government project in Singapore for a Learning Management System setup. Everything looked fine. Hardware was sorted. Document... Cybersecurity
Iftiaj Alom Pentest Shows Only “Low Findings”: Is That Really Good News? When the report arrives, you scroll through it with half a smile. Only a few low-severity findings. No critical bugs. No scary red flags. For a moment, it feels like winning. But then a question sits ...
Iftiaj Alom Your Browser Is the Weak Link: How Crypto Gets Stolen Without Hacking the Blockchain You did everything right. You used two-factor authentication. You avoided shady exchanges. You stored your crypto in a hardware wallet. Not once did you share your seed phrase. Yet one morning, you op... Cybersecurity
Iftiaj Alom When the Factory Went Quiet: A Lesson in OT Security The alarm didn’t go off. No flames. No broken machines. Just silence. One moment, the production line was moving smoothly. The next, everything froze. Screens flashed errors. Operators stood confused.... Cybersecurity
Iftiaj Alom Why Operational Technology Needs More Than Firewalls When U.S. President Donald Trump arrived at the United Nations, everything seemed prepared. Security was tight. Cameras were rolling. The schedule was exact. Then the escalator stopped. Not slowed. No... Cybersecurity
Iftiaj Alom The Job Ad That Could Cost You Millions It started with a simple job posting. A mid-sized tech company advertised for a new developer. The ad listed every tool they uses - React, Node.js, MySQL, AWS and even mentioned the exact firewall and...