Sam McMullen
Cybersecurity | Vulnerability Research | Infosec Writer
Exploring the evolving landscape of cyber threats from vulnerbilities to malware in the wild
Welcome to my first blog series exploring the real-world lifecycle of vulnerabilities — from discovery to defense.
Each part breaks down critical phases of exploitation, case studies, and strategies to respond effectively.✅ Already read the Vulnerabilities series? Just add #series2 to the end of the URL to jump straight to Series 2.📚 Read below or follow along on Medium.
Series 2: Unmasking the Threat
Viruses, Malware & CVEs in the Wild
Coming August 2025 - NOW LIVEThis new 7-part series dives into the evolution of digital pathogens—from the rise of computer viruses and polymorphic malware to the real-world exploitation of CVEs. Through case studies, threat intelligence, and defensive insights, we’ll reveal how attackers adapt, persist, and weaponize software vulnerabilities — and how defenders can stay one step ahead.Stay tuned for in-depth breakdowns, attack timelines, and the tools used on both sides of the cyber battlefield.
Series 3: Inside the Defender’s
Mind - LIVE
Understanding how defenders think, decide, and stay ahead.Cybersecurity isn’t just a battle of tools — it’s a battle of mindsets.
After exploring vulnerabilities and malware in my previous two series, this next chapter shifts the focus to the people on the front lines: the defenders.Cybersecurity isn’t just a battle of tools — it’s a battle of mindsets.
After exploring vulnerabilities and malware in my previous two series, this next chapter shifts the focus to the people on the front lines: the defenders.Across this series, we’ll explore:How defenders read the threat landscapeThe psychology behind prioritizing risksWhy some vulnerabilities matter more than othersHow blue teams learn from red teamsThe art of proactive defenseReal-world examples of defensive strategy in actionWhether you’re new to cybersecurity or deepening your defensive skillset, this series aims to illuminate the mindset that separates reactive security from strategic protection.Welcome to the defender’s mindset