<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Michail Domalewski]]></title><description><![CDATA[Solutions Architect @ Everpure (formerly Pure Storage) | Digital Nomad in Prague with my dog Diego | Naked CyberSec – raw insights from the trenches → nakedcybersec.com]]></description><link>https://www.nakedcybersec.com</link><image><url>https://substackcdn.com/image/fetch/$s_!OPnb!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbefb5def-c677-421e-8ffa-b375fd8906e5_1764x1764.jpeg</url><title>Michail Domalewski</title><link>https://www.nakedcybersec.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 03 May 2026 11:06:10 GMT</lastBuildDate><atom:link href="https://www.nakedcybersec.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Michail]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nakedcybersec@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nakedcybersec@substack.com]]></itunes:email><itunes:name><![CDATA[Michail Domalewski]]></itunes:name></itunes:owner><itunes:author><![CDATA[Michail Domalewski]]></itunes:author><googleplay:owner><![CDATA[nakedcybersec@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nakedcybersec@substack.com]]></googleplay:email><googleplay:author><![CDATA[Michail Domalewski]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Ugly Truth Behind IT Integrations: What’s Really Hiding Behind “Ecosystem” Talk]]></title><description><![CDATA[Dedicated to Victoria]]></description><link>https://www.nakedcybersec.com/p/the-ugly-truth-behind-it-integrations</link><guid isPermaLink="false">https://www.nakedcybersec.com/p/the-ugly-truth-behind-it-integrations</guid><dc:creator><![CDATA[Michail Domalewski]]></dc:creator><pubDate>Wed, 08 Apr 2026 16:05:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!h2so!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This article is based entirely on my personal experience working in System integrators, Value Added distributors, and Cybersecurity vendors.</p><p>It feels especially good to write it now, because my favorite company continues to step outside the usual boundaries. <a href="https://dmitrywashere.substack.com/">My colleague writes about this brilliantly</a>, and I&#8217;m happy to pick up his truly valuable ideas &#8212; even though we&#8217;re separated by a big beautiful ocean.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h2so!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h2so!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!h2so!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!h2so!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!h2so!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h2so!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:10271563,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/193588889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h2so!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!h2so!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!h2so!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!h2so!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c8684c7-5955-4eba-8e5f-0355d1f29017_2816x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>What kinds of integrations have I seen throughout my career?</strong></p><ol><li><p><strong>Marketing announcements</strong> between two different companies&#8217; products</p></li><li><p><strong>Technical integration</strong> through SDKs and APIs</p></li><li><p><strong>Internal integration</strong> of products inside one large corporation</p></li></ol><p>Want details? I&#8217;ve got plenty.</p><p><strong>1. Marketing Announcement</strong><br>The emptiest type. A beautiful croissant with nothing inside. Lots of noise, joint webinars, press releases. Under the hood &#8212; usually just shared APIs, syslog, and a couple of tested configurations.<br>The real goal is to create a cartel to push out a common competitor. The desire for mutual customer penetration usually ends with 2&#8211;3 pilot projects and then salespeople spreading the news by word of mouth. Friendship is friendship, but money is separate. Everyone wants a piece of someone else&#8217;s pie.</p><p>I&#8217;ve seen Web Application Firewall + DDoS protection cloud, data masking systems + database monitoring, and many others. Looks great on stage. Works weakly in production.</p><p><strong>2. Technical Integration via SDK</strong><br>More interesting technically. One vendor embeds another&#8217;s solution, usually on a Revenue Share model. Fast and convenient, but almost zero flexibility.<br>Examples: Web Gateway + antivirus, DLP + image recognition system. Such modules are often sold on the principle &#8220;you can&#8217;t live without them.&#8221;</p><p><strong>3. Internal &#8220;Friendship&#8221; Inside One Corporation</strong><br>The most fascinating and simultaneously saddest story.<br>The company loudly trumpets &#8220;one unified ecosystem&#8221; in every presentation, while inside, independent product teams fight for resources and don&#8217;t want to let their internal competitors onto their territory. This is especially common when there&#8217;s an old and a new product, or after mergers and acquisitions.</p><p>The result: dedicated salespeople pushing only their own direction, customer brain explosions (&#8220;why is one employee praising one thing and another praising something completely different?&#8221;), and the constant need for someone inside the company who can resolve all these internal conflicts.</p><p>What else don&#8217;t you know about the ugly side of IT integrations, but were afraid to ask?</p><p>Want me to continue &#8220;shocking&#8221; you with real cases? Let me know. Feedback helps me keep the right tone.</p><p>Stay naked.</p><p>&#169; 2026 Michal Domalewski / Naked CyberSec. All rights reserved.</p>]]></content:encoded></item><item><title><![CDATA[Dark Data, Legacy Dreams and Modern Reality: From 2012 FCI/DAC Nightmares to 2026 AI-Powered Data Intelligence]]></title><description><![CDATA[Disclaimer: This post reflects my personal opinion as an independent cybersecurity expert. How expert it really is &#8212; you decide, dear reader.]]></description><link>https://www.nakedcybersec.com/p/dark-data-legacy-dreams-and-modern</link><guid isPermaLink="false">https://www.nakedcybersec.com/p/dark-data-legacy-dreams-and-modern</guid><dc:creator><![CDATA[Michail Domalewski]]></dc:creator><pubDate>Wed, 01 Apr 2026 14:37:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aQzx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Reading yet another reminder that <strong>85 % of organisational data is still dark data</strong> instantly transported me back 10&#8211;15 years.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aQzx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aQzx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aQzx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aQzx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aQzx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aQzx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2403012,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/192851912?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aQzx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aQzx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aQzx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aQzx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6def226-5f17-49be-a3cd-1e25f0f900bb_3264x2448.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I remembered a product presentation by my future boss that ended with the classic line: &#8220;Come to the dark side &#8212; we have cookies.&#8221; At that time the world looked binary to me: clear light and darkness, no fifty shades of grey. I was hooked on security systems that could detect both external hackers and internal threats &#8212; insiders, corrupt employees, or those who looked loyal but kept a &#8220;fig in the pocket.&#8221;</p><p>That passion led me to two favourite technologies: <strong>IPS/NTA</strong> for network visibility and <strong>DLP</strong> for data leakage prevention.</p><p>The core ideas were solid even back then. The problem was execution. Everything required massive manual tuning because we didn&#8217;t have AI assistants that could simplify these tasks by orders of magnitude. Classification, policy creation, maintenance &#8212; it all demanded heavy upfront consulting. Many projects started with enthusiasm and died in the details.</p><p>Today the fundamental principles haven&#8217;t changed, but the tools have. As smart people say: knowledge of a few principles frees you from knowing many facts.</p><p>Modern DSPM platforms (with heavy use of LLMs and contextual graphs) finally make the old dream viable: automatic discovery and classification across the entire estate &#8212; cloud, on-prem, mainframe, SaaS &#8212; with minimal manual effort, real-time risk scoring, and automated orchestration into existing DLP, SIEM, and IAM tools.</p><p>The fairy tale we told ourselves in 2012 has become reality. What used to be blocked by the sheer volume of manual work is now achievable in weeks, not months.</p><p><strong>My Top Practical Tips for Hunting Violators</strong></p><p><strong>External threats (network / attacker perspective):</strong></p><ol><li><p>Clearly separate network-based and agent-based approaches. Mirror traffic at minimal chokepoints &#8212; ideally the core switch. Agent-based monitoring eats resources fast (cloud APIs are a separate conversation).</p></li><li><p>Protocol support should be broad, but real value comes from metadata analysis speed and depth. Real-time blocking of sophisticated attacks is still mostly a fairy tale. Focus on understanding collected metadata to trace and remediate.</p></li><li><p>Track events religiously. Anomaly detection alone doesn&#8217;t guarantee 100 % coverage, but it will definitely help you spot the elephant in the china shop.</p></li><li><p>Maintain a living network map and asset inventory. This isn&#8217;t just for nice management reports &#8212; it&#8217;s your daily tool for vulnerability hunting and context.</p></li></ol><p><strong>Internal threats (data leakage / insider perspective):</strong></p><ol start="5"><li><p>To truly understand data flows inside the organisation, start building and maintaining a connectivity graph. </p></li><li><p>Keyword analysis remains the solid foundation for leak hunting; everything else (ML, context, etc.) is a powerful addition. </p></li><li><p>Remember: DLP is not a product &#8212; it&#8217;s a triangle of people, processes, and technology. I like to illustrate it as &#8220;dark matter&#8221;: it absorbs everything and should release nothing. The &#8220;quasars&#8221; you see are exactly the leaks. </p></li><li><p>Monitoring without immediate prohibition is often the most effective long-term measure. Prevention and sanctions work best as exceptions, not the default.</p></li></ol><p><strong>Universal rule that applies to both hunting:</strong></p><ol start="9"><li><p><strong>Ideas (and insights) are like fish.</strong> If you want to catch little fish, you can stay in the shallow water. But if you want to catch the big fish, you&#8217;ve got to go deeper. Down deep, the fish are more powerful and more pure. They&#8217;re huge and abstract. And they&#8217;re very beautiful. &#8212; David Lynch</p></li></ol><p>In threat hunting this means: don&#8217;t stop at surface-level alerts and obvious IOCs. Dive deeper into context, relationships, business impact, and subtle behavioural patterns. The real &#8220;big fish&#8221; &#8212; sophisticated insiders, advanced persistent threats, or critical dark data exposures &#8212; hide in the depths. Modern tools with AI and multidimensional graphs finally let us go there without drowning in manual effort.</p><p>The approaches we loved 10&#8211;15 years ago are still relevant. The difference now is that AI and modern data intelligence layers remove the biggest historical blocker &#8212; endless manual labour.</p><p>If this resonated or gave you a useful idea, you can <a href="https://ko-fi.com/nakedcybersec">BUY ME A COFFEE</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BTIz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BTIz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BTIz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BTIz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BTIz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BTIz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg" width="220" height="380" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:380,&quot;width&quot;:220,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:34798,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/192851912?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BTIz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BTIz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BTIz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BTIz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0aa98b3f-5fb4-4d3f-ad2b-3479b7e3ce0e_220x380.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>---</p><p>&#169; 2026 Michal Domalewski / Naked CyberSec. All rights reserved.</p>]]></content:encoded></item><item><title><![CDATA[The Bloody Enterprise: What Motorcycle Clubs Can Teach Us About Corporate Business]]></title><description><![CDATA[2&#8211;4 min read]]></description><link>https://www.nakedcybersec.com/p/the-bloody-enterprise-what-motorcycle</link><guid isPermaLink="false">https://www.nakedcybersec.com/p/the-bloody-enterprise-what-motorcycle</guid><dc:creator><![CDATA[Michail Domalewski]]></dc:creator><pubDate>Thu, 26 Mar 2026 10:45:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BOsA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This short post has nothing to do with technology. It&#8217;s about the &#8220;Bloody Enterprise&#8221; &#8212; the very real, often brutal business of selling hardware, software, and services developed by one corporation to another.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BOsA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BOsA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic 424w, https://substackcdn.com/image/fetch/$s_!BOsA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic 848w, https://substackcdn.com/image/fetch/$s_!BOsA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic 1272w, https://substackcdn.com/image/fetch/$s_!BOsA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BOsA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b409be45-fa83-41f3-95f9-2ea027863111.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1231935,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/192188060?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BOsA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic 424w, https://substackcdn.com/image/fetch/$s_!BOsA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic 848w, https://substackcdn.com/image/fetch/$s_!BOsA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic 1272w, https://substackcdn.com/image/fetch/$s_!BOsA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb409be45-fa83-41f3-95f9-2ea027863111.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Sitting on a Starbucks terrace with coffee and a cigarette, I noticed a tall, muscular guy in a vest from the local <strong>Black Dogs LE MC</strong> (Czech Republic). That instantly took me back to my one-time participation in a Night Wolves event, my last visit to their clubhouse in Moscow&#8217;s Mnevniki district, and the best &#8220;business manual&#8221; series my old friend &#8212; a Lead AE at the Russian office of a major American IT vendor &#8212; ever recommended: <strong>Sons of Anarchy</strong>.</p><p>It was perfect decompression after a heavy business day. Nothing clears the head like bikes, brotherhood, and controlled chaos.</p><blockquote><p>&#8220;Companies don&#8217;t do business with companies.<br>People from one company do business with people from another.&#8221;</p></blockquote><p>Despite the surface-level differences &#8212; motorcycles, gangs, guns, and drugs in the series versus suits, Excel files, and procurement procedures in real life &#8212; the core ideas are strikingly similar:</p><ul><li><p>Ruthless competition</p></li><li><p>Discipline and hierarchy</p></li><li><p>Intelligence gathering (OSINT and insiders)</p></li><li><p>Building deep trusted relationships</p></li><li><p>Confidential negotiations</p></li><li><p>Strategy and power struggles for resources and positions</p></li></ul><h3>Two Very Different Clubs, Same Code</h3><p><strong>Black Dogs LE MC (Czech Republic)</strong><br>Founded in 2002, this is the first Law Enforcement Motorcycle Club in the Czech Republic. Membership is restricted to police officers, soldiers, firefighters, paramedics, and other state servants (99% LE). The club emphasizes discipline, service to the law, and riding together. It is independent and a co-founder of the Czech National LE MC Coalition.</p><p><strong>Night Wolves MC (Russia)</strong><br>Founded in 1989 in Moscow by Alexander &#8220;The Surgeon&#8221; Zaldastanov. One of the largest and most influential motorcycle clubs in Russia (estimated 5,000&#8211;7,000 members across 45+ chapters). Closely tied to the Kremlin, they organize Victory Day runs and large-scale bike shows. The club and its leader are under Western sanctions.</p><p>Two clubs on opposite sides of the geopolitical divide, yet living by surprisingly similar principles: loyalty, hierarchy, brotherhood, and a strong code.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Oqxx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Oqxx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic 424w, https://substackcdn.com/image/fetch/$s_!Oqxx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic 848w, https://substackcdn.com/image/fetch/$s_!Oqxx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic 1272w, https://substackcdn.com/image/fetch/$s_!Oqxx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Oqxx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1432977,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/192188060?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Oqxx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic 424w, https://substackcdn.com/image/fetch/$s_!Oqxx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic 848w, https://substackcdn.com/image/fetch/$s_!Oqxx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic 1272w, https://substackcdn.com/image/fetch/$s_!Oqxx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb23d58-7442-426c-b9b4-24b5e68478be_2316x3088.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The Dark Mirror: Hunter S. Thompson and the Hells Angels</h3><p>To understand the darker side of this culture, it&#8217;s worth remembering the greatest gonzo journalist, <strong>Hunter S. Thompson</strong>. In 1965 he began with an article for <em>The Nation</em>, then spent over a year fully embedded with the Hells Angels &#8212; riding with them, drinking in their bars, and living their life as a participant-observer.</p><p>The result was his 1967 classic <strong>&#8220;Hell&#8217;s Angels: A Strange and Terrible Saga&#8221;</strong> &#8212; one of the most honest portraits of 1%er outlaw motorcycle culture ever written. Thompson showed the raw mix of brotherhood, violence, freedom, alcohol, and rebellion against society without cheap sensationalism.</p><p>At the end of his time with the club, he was severely beaten by members. The relationship ended badly, yet the book remains a landmark.</p><h3>10 Rules from Traditional 1%er Motorcycle Clubs</h3><p>Here are ten core rules commonly found in the charters (bylaws) of traditional outlaw motorcycle clubs like the Hells Angels and similar groups:</p><ol><li><p>Loyalty to the club above all else.</p></li><li><p>Always back your brothers.</p></li><li><p>No talking to outsiders. No snitching.</p></li><li><p>Respect the hierarchy and chain of command.</p></li><li><p>Prospecting period is mandatory &#8212; full membership and trust are earned over a long trial.</p></li><li><p>Club property (Colors, Vest, Brand, reputation) is sacred and untouchable.</p></li><li><p>Never lie to or steal from your own.</p></li><li><p>Membership is a lifelong commitment. Leaving the &#8220;company&#8221; does not cancel past obligations or responsibilities.</p></li><li><p>Strict selection &#8212; new members (or key partners) accepted only by unanimous vote. One &#8220;no&#8221; is enough.</p></li><li><p>Discipline for violations is swift and severe.</p></li></ol><p>Now replace the word <strong>&#8220;motorcycle club&#8221;</strong> with <strong>&#8220;corporation&#8221;</strong> &#8212; and you get a surprisingly accurate unofficial bible of corporate business worldwide.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bC-9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bC-9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic 424w, https://substackcdn.com/image/fetch/$s_!bC-9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic 848w, https://substackcdn.com/image/fetch/$s_!bC-9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic 1272w, https://substackcdn.com/image/fetch/$s_!bC-9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bC-9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1984000,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/192188060?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bC-9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic 424w, https://substackcdn.com/image/fetch/$s_!bC-9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic 848w, https://substackcdn.com/image/fetch/$s_!bC-9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic 1272w, https://substackcdn.com/image/fetch/$s_!bC-9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f3fc93-3a7f-4437-a3ff-a43cece4b47c_3024x4032.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That&#8217;s the naked truth. If this was useful, you can <a href="https://ko-fi.com/nakedcybersec">BUY ME A COFFEE</a>.</p><p>---</p><p>&#169; 2026 Michal Domalewski / Naked CyberSec. All rights reserved.</p>]]></content:encoded></item><item><title><![CDATA[The romance of the Russian criminal world and cybercrime. A true story.]]></title><description><![CDATA[Estimated read time: 2&#8211;5 minutes]]></description><link>https://www.nakedcybersec.com/p/the-romance-of-the-russian-criminal</link><guid isPermaLink="false">https://www.nakedcybersec.com/p/the-romance-of-the-russian-criminal</guid><dc:creator><![CDATA[Michail Domalewski]]></dc:creator><pubDate>Sun, 22 Mar 2026 12:36:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lkc4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today&#8217;s story aims to introduce you to the dark romance of the Russian underworld &#8211; especially Russian cybercrime: extortionists, leaked databases, the critical importance of monitoring &amp; incident response, and what really hides behind the shiny marketing of &#8220;cybersecurity.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lkc4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lkc4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lkc4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lkc4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lkc4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lkc4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg" width="1125" height="713" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:713,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:176927,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/191749829?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lkc4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lkc4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lkc4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lkc4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524a0072-ca38-45c9-a11e-419a540c9890_1125x713.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Based on real events. All names changed, companies/brands anonymized (except actor Vladimir Vdovichenkov from &#8220;Bumer 2&#8221; and black BMW X5).</p><p>So, <strong>Bumer. Film Two</strong>.</p><p>Released in 2006 when the first part was already a massive hit. The main theme became ringtones for thousands. We watched Part 1&#8230; during a Social Studies class in IT college &#128514;</p><p>Context: watch at least the first 17 minutes with English subs. In the director&#8217;s cut (5&#8211;7 min) there&#8217;s a deleted scene: &#8220;Cat&#8221; (Vladimir Vdovichenkov) to the prison boss &#8211; words I&#8217;ll never forget:<br>&#8220;Why did you kill a good guy&#8230; he had only several months left to parole&#8230;&#8221;</p><div id="youtube2-GWGTe9Tp7Rk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;GWGTe9Tp7Rk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/GWGTe9Tp7Rk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>The film&#8217;s key symbol: material dream of the boys &#8212; a black BMW X5.<br>Premiere: March 7, 2006 (Russia &amp; Kazakhstan). My first university year. One year later I met Vladimir Vdovichenkov&#8230; at the traffic police getting plates for new cars. Mine &#8211; bronze Hyundai Accent from dad. His &#8211; guess two times &#128527;</p><p>Real events hit in 2013. Age 25. Left bank cybersec tech role, became pre-sales manager (cybersecurity focus) at a big IT integrator. Preparing million-dollar tender proposal: TCO, architecture, vendor &amp; client calls.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n0Dm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n0Dm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg 424w, https://substackcdn.com/image/fetch/$s_!n0Dm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg 848w, https://substackcdn.com/image/fetch/$s_!n0Dm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!n0Dm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n0Dm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2049910,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/191749829?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!n0Dm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg 424w, https://substackcdn.com/image/fetch/$s_!n0Dm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg 848w, https://substackcdn.com/image/fetch/$s_!n0Dm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!n0Dm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20322b24-9ceb-40e2-baf8-9543dbe46080_3264x2448.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>14:00 &#8211; buried in Excel. Hear boss: key outsourced customer hit by massive DDoS. Business down, terminals in richest regions offline, top management in panic.</p><p>Google search &#8594; volunteer to help. No standard playbook &#8594; sent to &#8220;hold the dying man&#8217;s hand.&#8221;</p><p>15:00. Racing with tech manager. Explain problem &amp; solutions on the way. Found Frostbyte (our partner) &amp; Shieldex in 5 min. Call A.Zvizdilov &#8211; get a storm of swearing: &#8220;We won&#8217;t protect this client for any money &#8211; he accused us of staging the attack.&#8221; Calm him down, agree. Fix with AE: if client says yes &#8211; protect at list price + standard discount, no haggling.</p><p>16:00. 30th floor business center, view almost like Central Park NYC. Present options: SECaaS optimal, on-prem &#8220;free&#8221; but limited, hybrid best of both. Draw scheme on whiteboard.</p><p>17:00. Chemistry with CIO. Panic fades, reason returns. Action: whitelists, collect terminal IPs piece by piece, BGP tunneling, extra firewall, approval, prod. 3 intense hours. Order pizza.</p><p>21:00. Pepperoni, black soda, mood up. Reroute traffic, wait for DNS prop, test, tune. Not instant &#8211; another ~5 hours, but calm &amp; professional. Business restored.</p><p>04:00 next day. Watch sunrise together. Handshakes, go home.</p><p>09:00. Call through sleep: tender manager &#8212; &#8220;Where&#8217;s TCO?!&#8221; Deadline 18:00. Aggression: &#8220;I need it NOW!&#8221; Shave, shower, wipe tears of frustration.</p><p>10:00. Proposal sent, I&#8217;m on the carpet &#8212; restrained but pissed.</p><p>Outcome: bonus (bought first motorcycle), ride in boss&#8217;s black BMW X5, personal coaching from him. Built deep trust with CIO &#8211; became their trusted architect. Shared expertise, built IR plans.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Rctl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Rctl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Rctl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Rctl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Rctl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Rctl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2286197,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/191749829?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Rctl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Rctl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Rctl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Rctl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff480d97d-2b71-426b-8ef6-be7ac29038b1_2448x2448.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Later attack on customer DB via web server &#8212; they were ready. Detected leak via read spike in Storage monitoring, blocked channel in time. It turned out to be just a couple of lines of malicious code injected into the website. <em>Who could have done that?</em> &#129300;</p><p>Peak twist: I&#8217;m on client side, defending them to authorities &amp; R.Borodach (Frostbyte investigations head) &#8212; &#8220;All measures taken, no admin liability for data breach.&#8221;</p><p>3 years on: R.Borodach arrested. Frostbyte: &#8220;No known violations,&#8221; fired same day. Still serving sentence.</p><p><strong>Moral (short &amp; hard):</strong></p><ol><li><p>Control ALL your assets. Even a simple landing page can be entry point. Never mix public &amp; business flows. Think 10&#215; about risks before publishing.</p></li><li><p>Store data only on Enterprise-Ready Storage. Invest in monitoring &amp; response processes &#8211; saves nerves, time, and proves innocence when shit hits the fan.</p></li><li><p>Read my blog, take ownership, but stay away from gray zones. Respect the law. Ignorance is no excuse.</p></li></ol><p><strong>Resources: </strong>Mobylnik (soundtrack)  </p><div id="youtube2-CjFQrN7gCxE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;CjFQrN7gCxE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/CjFQrN7gCxE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Movie or real life &#8212; which is crazier? Drop thoughts below.</p><p>If this was useful, you can <a href="https://ko-fi.com/nakedcybersec">BUY ME A COFFEE</a>.</p><p>---</p><p>&#169; 2026 Michal Domalewski / Naked CyberSec. All rights reserved.</p>]]></content:encoded></item><item><title><![CDATA[Friday Spice: BDSM in IT, Old Servers, and Why Virtualization Won]]></title><description><![CDATA[SPOILER: 18+]]></description><link>https://www.nakedcybersec.com/p/friday-spice-bdsm-in-it-old-servers</link><guid isPermaLink="false">https://www.nakedcybersec.com/p/friday-spice-bdsm-in-it-old-servers</guid><dc:creator><![CDATA[Michail Domalewski]]></dc:creator><pubDate>Fri, 20 Mar 2026 21:44:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0nQp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>May cause feelings similar to reading Hunter S. Thompson&#8217;s Fear and Loathing in Las Vegas. Puritans, skip this one.</p><p>Today I want to talk about new data storage technologies and virtualization in particular. Right away: no praising companies I worked for, work at, or will work for. It&#8217;s cool when someone climbs so high that challengers lose the desire to compete directly. But every security guy knows: behind every beautiful marketing slide hides the same thing &#8212; caffeine addiction, ruined personal life, work-life balance broken over the knee, peeking into the windows of the neighboring business center, pouring water from glass to glass.</p><p>And everyone who has tried <strong>BDSM</strong> (I mean Business Development Sales &amp; Marketing) knows: to keep your glass full, you have to dry someone else&#8217;s a little.</p><p>So let&#8217;s talk about the outdated and long-obsolete approach of storing data on physical servers. Because it&#8217;s been bugging me.</p><p>Remember that clumsy, humming <strong>supertower</strong> in the server room? Puffing, groaning, but God forbid you bump it with your elbow or spill coffee nearby &#8212; the head admin gets a near-heart attack because the entire accounting department lives on it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0nQp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0nQp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0nQp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0nQp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0nQp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0nQp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3153881,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/191627255?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0nQp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0nQp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0nQp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0nQp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d89c74b-3c77-45d1-8d23-cde24242d2eb_2448x3264.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Scale doesn&#8217;t matter: in a big company you might have 200 of these.</p><p>Remember? You can&#8217;t do anything with it &#8212; old-school rule: &#8220;It works &#8212; don&#8217;t touch it.&#8221; Yes, with bugs. Yes, by mood. Once every 1&#8211;2 years you have to stay up all night restoring because a disk failed or a fan died. All with downtime and nerves.</p><p>And <strong>cybersec</strong> is not just about &#8220;nobody finds your security hole.&#8221; It&#8217;s first of all about business resilience, continuity, risk control, and making sure catastrophic events don&#8217;t put the company out of business.</p><p>Then virtualization came and brought virtual farms. Most people screamed: &#8220;Unsafe! How can you share power between 2&#8211;3 (max 7&#8211;10) beautiful modern servers with a shared resource pool?&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7dZh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7dZh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7dZh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7dZh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7dZh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7dZh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg" width="1456" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:83554,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/191627255?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7dZh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7dZh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7dZh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7dZh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe744a51-d572-4607-865d-2879ac3d4f6c_2007x1412.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Turns out &#8212; you can. And it&#8217;s much safer than 50 dying repurposed PCs.</p><p>But life moves on, and we move with it. The needle of virtualization turned out stronger than morals, and your dealer decided to raise prices sharply. Where to put your Enterprise files now?</p><p>My answer: <strong>1&#8211;2 unified storage</strong> systems with well-organized role-based access for all departments, replication of critical data, fast and convenient migration between storages, encryption, deduplication, and compression.</p><p>But that&#8217;s just my opinion. You decide and act.</p><p>If this was useful, you can <a href="https://ko-fi.com/nakedcybersec">BUY ME A COFFEE</a>.</p><p>---</p><p>&#169; 2026 Michal Domalewski / Naked CyberSec. All rights reserved.</p>]]></content:encoded></item><item><title><![CDATA[Naked CyberSec: Trust Starts with Knowing Who I Am]]></title><description><![CDATA[You made your bed &#8212; now lie in it.]]></description><link>https://www.nakedcybersec.com/p/naked-cybersec-trust-starts-with</link><guid isPermaLink="false">https://www.nakedcybersec.com/p/naked-cybersec-trust-starts-with</guid><dc:creator><![CDATA[Michail Domalewski]]></dc:creator><pubDate>Thu, 19 Mar 2026 22:30:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7fW7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>That&#8217;s the English way of saying what Russians call &#8220;&#1053;&#1072;&#1079;&#1074;&#1072;&#1083;&#1089;&#1103; &#1075;&#1088;&#1091;&#1079;&#1076;&#1077;&#1084; &#8211; &#1087;&#1086;&#1083;&#1077;&#1079;&#1072;&#1081; &#1074; &#1082;&#1091;&#1079;&#1086;&#1074;&#8221;. If you name your thing &#8220;Naked&#8221;, be ready to show everything as it is. No hiding.</p><p>My story started long before I ever touched a computer. In 1936, thousands of Poles and Germans from the border regions of Ukraine (mostly Volyn and Zhytomyr) were deported to Kazakhstan by order of the Soviet government. They were loaded into freight trains with only an hour to pack. Their past was erased in one trip.</p><p>One of those trains carried my grandfather &#8211; a little Polish boy &#8211; and his family. They ended up in Labor Settlement No. 12 of Karlag (now the village of Pervomayka in Akmola Region, Kazakhstan).</p><p>Karlag was one of the biggest agricultural camps in the Gulag system. At its peak, it covered almost 1.8 million hectares with hundreds of small points, farms, and sites. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7fW7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7fW7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic 424w, https://substackcdn.com/image/fetch/$s_!7fW7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic 848w, https://substackcdn.com/image/fetch/$s_!7fW7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic 1272w, https://substackcdn.com/image/fetch/$s_!7fW7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7fW7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:928690,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/191526107?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7fW7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic 424w, https://substackcdn.com/image/fetch/$s_!7fW7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic 848w, https://substackcdn.com/image/fetch/$s_!7fW7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic 1272w, https://substackcdn.com/image/fetch/$s_!7fW7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff812912d-0fe1-44d2-9727-4679a9b8ab90_3024x4032.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>People survived in the endless steppe, built farms, and raised children. My grandfather made it through. Despite his &#8220;unreliable&#8221; background, he finished a railway college, married a doctor (my grandmother), and in 1955 my father Alexander was born in the same Akmola Region.</p><p>I was born on July 27, 1988, in Stepnogorsk &#8211; a completely closed town that wasn&#8217;t even on public maps until the late 1980s. The main factories were the Central Mining and Chemical Plant (uranium mining and processing) and the Progress plant (where they developed components for biological weapons in Soviet times). After the USSR collapsed, the town suffered hard in the 1990s: factories closed, people left. My family moved too &#8211; first to Moscow Region, then to Moscow in 2000.</p><p>I loved computers from early childhood. We got an 286 PC &#8211; the second one in the whole town &#8211; when I was four years old. That decided my path. I went to College of Information Technologies, and later chose university in cybersecurity &#8211; back then it seemed the most romantic field in IT.</p><p>University was brutal: <strong>5-6 exams twice a year</strong>, constant stress, math, physics, philosophy, database and network security, low-level and high-level programming, tons of paper-based security rules, and basics of cyber warfare. My fuel was five Ritter Sport chocolates a day. Languages were hard, but math and history always came easy.</p><p>After graduation I started as a security administrator in a big bank. A couple of years later I realized I wanted to work more with people than with machines. I moved to system integration. Over the years in Russia I worked at well-known vendor companies: Kaspersky, Positive Technologies, Garda Technologies, Solar Security. I traveled all over the country &#8211; from Kaliningrad to Yuzhno-Sakhalinsk, and many times to Kazakhstan and Kyrgyzstan on business trips.</p><p>Everything was going fine until 2022, when the war started. I left &#8212; first to Kyrgyzstan, then to Kazakhstan. I got a residence permit and applied for Polish citizenship through repatriation. In 2025 I finally returned to the homeland of my ancestors.</p><p>Why am I telling you this long personal story?</p><p>Because this blog is called Naked CyberSec. After 15+ years in the field, I&#8217;m deeply convinced: <strong>real cybersecurity is impossible without trust</strong>.</p><p>Everything we build &#8211; Zero Trust architectures, immutable snapshots, AI enterprise infrastructure &#8211; rests on trust. Even in Zero Trust the second word is still <strong>trust</strong>. Trust, but verify. I know who I am. Now you know too.</p><p>This blog is my way of being completely open. No masks. With a history that goes through the Gulag, deportations, closed uranium cities, to today &#8212; living in Prague as a digital nomad with my dog Diego.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sd-2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sd-2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic 424w, https://substackcdn.com/image/fetch/$s_!sd-2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic 848w, https://substackcdn.com/image/fetch/$s_!sd-2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic 1272w, https://substackcdn.com/image/fetch/$s_!sd-2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sd-2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1087026,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nakedcybersec.com/i/191526107?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sd-2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic 424w, https://substackcdn.com/image/fetch/$s_!sd-2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic 848w, https://substackcdn.com/image/fetch/$s_!sd-2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic 1272w, https://substackcdn.com/image/fetch/$s_!sd-2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff93a0481-98e1-4b7c-970e-cd6eda8db394_2316x3088.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Stay naked. To be continued...</p><p>---</p><p>&#169; 2026 Michal Domalewski / Naked CyberSec. All rights reserved.</p>]]></content:encoded></item><item><title><![CDATA[Welcome to Naked CyberSec: Raw Truths from the Trenches ]]></title><description><![CDATA[(No Slides, No BS)]]></description><link>https://www.nakedcybersec.com/p/welcome-to-naked-cybersec-raw-truths</link><guid isPermaLink="false">https://www.nakedcybersec.com/p/welcome-to-naked-cybersec-raw-truths</guid><dc:creator><![CDATA[Michail Domalewski]]></dc:creator><pubDate>Wed, 18 Mar 2026 23:40:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!OPnb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbefb5def-c677-421e-8ffa-b375fd8906e5_1764x1764.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey there,</p><p>So, the blog is live. Naked CyberSec. No fancy logo (yet), no marketing team breathing down my neck, just me, a laptop, and my dog Diego snoring like a tiny chainsaw next to me on the couch in Prague.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XWpy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XWpy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic 424w, https://substackcdn.com/image/fetch/$s_!XWpy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic 848w, https://substackcdn.com/image/fetch/$s_!XWpy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic 1272w, https://substackcdn.com/image/fetch/$s_!XWpy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XWpy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/106372de-7822-454a-8995-081f07c375f9.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1171805,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nakedcybersec.substack.com/i/191426142?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XWpy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic 424w, https://substackcdn.com/image/fetch/$s_!XWpy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic 848w, https://substackcdn.com/image/fetch/$s_!XWpy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic 1272w, https://substackcdn.com/image/fetch/$s_!XWpy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F106372de-7822-454a-8995-081f07c375f9.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s March 19, 2026. 00:30 in Prague. The streets are quiet now&#8212;only the occasional tram rumble and night owls heading home. Diego is snoring peacefully beside me, and I&#8217;m finally hitting &#8220;Publish&#8221; on the first post of Naked CyberSec. No more excuses.</p><p>Why now? Why this blog at all?  </p><p>Because the infosec world (and IT in general) is drowning in polished corporate fluff, vendor spin, and &#8220;best practices&#8221; that sound great in webinars but fall apart in real production environments. We need more naked truth &#8212; raw, unfiltered, from someone who&#8217;s actually been there.</p><p>Short answer: because the IT world needs more naked truth and less polished corporate fluff.</p><p>---</p><p>&#169; 2026 Michal Domalewski / Naked CyberSec. All rights reserved.</p>]]></content:encoded></item></channel></rss>