Brunswick, ME • (207) 245-1010 • contact@johnzblack.com
I haven't yet decided exactly what kind of content I intend to post here. I love cooking and taking pictures so initially I'll probably just share recipes, photos and that kind of thing.
If I really start using the space I may expand on the blog capabilities. For now I'm keeping it quite simple.
Rapid exploitation plus cross-platform AI exposure means next-sprint patching is no longer a safe operating model.
Read More
Zimbra exploitation, Roundcube sanitizer bypasses, and OpenSIPS auth-bypass risk all point to one truth: communication infrastructure remains a high-value route to durable access.
Read More
Navia, Aura, an insider ransomware conviction, and Lazarus attribution show why breach readiness should be built around resilient process, not assumptions about attacker type.
Read More
Enterprise AI security now requires two disciplines at once: policy-level governance for agents and hard application security work in the toolchain beneath them.
Read More
From BYOVD-based EDR suppression to tax-season phishing pipelines and botnet disruption, attacker scale now comes from operational integration, not one breakthrough trick.
Read More
Today's critical bugs are not equal. ScreenConnect, SharePoint, UniFi, and Magento all threaten high-leverage control surfaces where one compromise can cascade.
Read More