Adam Gardner
-
🧠 How to Code in Python: Part 2 — If, Else, and Logic
In the last post, we built our first Python script, explored variables, and got user input.…
-
🐍 How to Code in Python: Getting Started — First Program, Variables, and User Input
Welcome to the How to Code in Python series — your beginner-friendly guide to learning how…
-
🔓 CVE‑2025‑5777 – CitrixBleed 2: Memory Leaks, MFA Bypass, and Full Session Hijack
CVE‑2025‑5777 (“CitrixBleed 2”) is a critical vulnerability in Citrix NetScaler ADC and Gateway appliances that allows…
-
🤖 AI-Powered Attacks: The Rise of Machine-Augmented Adversaries
Artificial Intelligence (AI) is no longer a defensive-only tool. Threat actors are integrating AI into every…
-
🔧 How to Use the Resume Automation Tool
If you saw my post about finally launching my Python-based resume automation tool — this post…
-
🔐 Automating Resume + Cover Letter Personalization with Python and tkinter
By Adam GardnerLinkedIn 💡 The Problem Customizing each cybersecurity job application manually — especially when juggling…
-
Side Quests, Six Monitors, and a Brain on Fire: Embracing the Chaos of Cyber Workflows
Is it ADHD… or just cybersecurity? Picture this: I’m at my desk with six monitors, each…
-
Creating a Network Traffic Baseline and Detecting Anomalies with Zeek: An Advanced SOC Analyst Guide
Introduction Network traffic baselining is a cornerstone of proactive threat detection in Security Operations Centers (SOCs).…
-
A Technical Guide to Determining What Ports to Leave Open via Firewall
Leaving unnecessary ports open increases your attack surface and can result in exploitation, lateral movement, or…
-
From Host to Hidden: Multi-Layered VPN + Tor Access for Cyber Threat Intelligence
🔐 Introduction Modern cyber threat intelligence often demands access to the darker corners of the internet—ransomware…