Author: Seeline Cyber

  • I Know What You Did Last Summer: Hacks, Leaks, and Revelations

    I Know What You Did Last Summer: Hacks, Leaks, and Revelations

    “A single leak can illuminate the machinery of oppression that thrives in darkness, offering the public a glimpse of truths carefully buried.” Early in 2024, I heard programmer and former infosec specialist and investigative journalist at The Intercept, Micah Lee, interviewed on the podcast Firewalls Don’t Stop Dragons. Lee was discussing his soon-to-be-released book, Hacks,…

  • Dial-Up Dreams: Connection and the Gift of Curiosity

    Dial-Up Dreams: Connection and the Gift of Curiosity

    Geocities, Hotmail, IRC, MySpace, AskJeeves, MSN, Internet Cafes, Limewire, Napster, eBay, Amazon – but mostly books, ‘Kewl’ not ‘cool’ A/S/L? AOL and AIM, and manually having to type ‘www’ in front of every address – does anything on this list conjure a memory for you? Maybe it’s the impending holiday season, or the looming new…

  • Australia’s Philly Shell Moment: Security Under Pressure

    Australia’s Philly Shell Moment: Security Under Pressure

    The Philly Shell: a boxing technique with surprising lessons for cybersecurity. When applied poorly, the risks are clear. Are we ready to face the challenges?

  • Round Three: Day Three

    Round Three: Day Three

    Round three began with a sense of urgency. Similar to round one, I knew I had to get to work. Unfourtunately, the once mythical adrenaline rush and subsequent dump was very much a reality…

  • Round Two: Day Two

    Round Two: Day Two

    I don’t remember much of round two. The adrenaline dump was real and my memory of what happened is scattered. Unlike my overflowing note book from CyberCon, I don’t have my scrawled GP-style handwriting to refer to. I have glimpses of memories, like backing my opponent up into the corner but being unable to will…

  • Round One: Day One

    Round One: Day One

    When I was preparing for my first boxing match, I received some excellent advice from a friend who had previously competed (and who, in doing so, inspired me to compete) ‘the rounds go SO quickly, don’t waste a second’ So, in training I worked judiciously to take full advantage of the limited time I had;…

  • The anticipatory rise

    The anticipatory rise

    “I discovered that when I believed my thoughts I suffered, but when I didn’t believe them I didn’t suffer, and that this is true for every human being. Freedom is as simple as that.” – Byron Katie, Author I’m officially days out from my very first boxing match. It’s a masters event, interstate, against an opponent…

  • Top 10 Frameworks in Boxing and Cybersecurity

    Top 10 Frameworks in Boxing and Cybersecurity

    • Style Insight: The jab is the most important punch in boxing. The jab can close space, it can set up combinations, it can protect a fighter and keep them in the bout longer. Jabbing is an art of constant, precise, and strategic strikes intended to wear down an opponent over time. It’s about control,…

  • Corner Crew: How Community Spirit Shaped My WiCys CTF Challenge

    Corner Crew: How Community Spirit Shaped My WiCys CTF Challenge

    Earlier this month, my striking coach competed in his first boxing match. Though he’s primarily focused on MMA and other martial arts, he wanted to grow as an athlete and take on a new challenge. Despite preparing thoroughly, the night didn’t go as planned; he took heavy punishment, including knockdowns, compounded by a severe weight…

  • Becoming a blue belt in cybersecurity

    Becoming a blue belt in cybersecurity

    Recently, my BJJ coach promoted me to blue belt. BJJ, for the uninitiated is Brazillian Jiu Jitsu, a martial art originating in Japan (Jiu Jitsu) which was adopted by the Gracie family in Brazil and exported to the world. Like cybersecurity, I arrived at the BJJ game later in life – it took me a…