top of page
Search


From World of Warcraft to Threat Hunting: An Unconventional Path into Cybersecurity (And How You Can Too)
Starting a career in cybersecurity isn't always straightforward. Sometimes it takes luck, but mostly it's about demonstrating what you can do and refusing to give up when doors seem closed. Oh, and taking notes. Seriously, take notes. I'll explain why I learned this the hard way. The Gaming Gateway My journey didn't begin in a classroom or with a computer science degree. It started in Azeroth, the virtual world of World of Warcraft. While others saw just a game, I saw a compl
Damien van der Linden
Nov 58 min read
Â


Hunting for CVE-2025-59287: Detecting Vulnerable WSUS Servers
Summary Microsoft has released an urgent out-of-band security update to address CVE-2025-59287 (after a previous update in Patch Tuesday that didn't quite hit the nail on the head), a critical remote code execution vulnerability in Windows Server Update Services (WSUS) that is being actively exploited in the wild. This vulnerability allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges by exploiting unsafe deserialization in WSUS's cookie handling
Damien van der Linden
Oct 274 min read
Â


LindenSec's KQL CTF #1: The Phantom Admin Login
A short CTF styled KQL challenge! Can you find out what happened?
Damien van der Linden
Sep 152 min read
Â


Detecting ManualFinder/PDF Editor Malware Campaign with KQL
A free PDF Editor turning itself into an infostealer overnight. Let's hunt it down with KQL!
Damien van der Linden
Aug 257 min read
Â


Detecting Executive Impersonation Campaigns with KQL
These e-mails pretend to be from your CEO, have your first name as the subject, and contain absolutely no links, no files, just text.
Damien van der Linden
Jul 154 min read
Â


FileFix: The New Evolution of ClickFix in Cyber Threats
ClickFix was bad enough; it became the second most common attack vector right after phishing. ClickFix tricked users with a deceptive webpage (often disguised as a CAPTCHA) that prompted them to copy and paste a string, open the Run dialog with WIN+R, and boom! Hidden in front of what looked like a harmless path was a whole PowerShell payload. This led to a surge in infostealers, cryptominers, and RATs. It was only a matter of time before similar techniques popped up. Inspire
Damien van der Linden
Jul 113 min read
Â
bottom of page


