blancos

Yo, I’m Brian Kimathi, a cybersecurity and IT systems enthusiast from Kenya, passionate about building secure digital environments and improving the world through technology. With over 6 years of hands-on experience in system administration, cybersecurity operations, integrations, mobile money systems and more, I’ve worked on everything from securing backend infrastructures to helping companies respond to real-world cyber threats. My journey has taken me through diverse roles—system administrator at East African Data Handlers, privacy analyst at Techno Brain, senior systems analyst at Bowmans Law and tens of consulting roles.. Along the way, I’ve consulted on projects across the banking, telco, and social impact sectors. I enjoy getting my hands dirty with SecOps tools, system analysis, and threat response frameworks, but what drives me most is helping others understand and embrace the power of secure technology. I hold a Bachelor’s degree in Computer Security and Forensics, certifications in networking and cybersecurity, and I’m currently exploring global opportunities in cybersecurity and infrastructure. This blog is my little corner of the internet where I share security tips and tools, deep dives into IT systems and processes, stories from real-world projects, and mentorship advice for young professionals in tech. If you're into tech, security, or figuring out this digital world you’ll feel right at home here. Let’s connect, learn, and grow together.

written articles

AI Shifts the Ground Under Tech Careers

AI is reshaping tech careers including cybersecurity offering both challenges and chances for growth through skill adaptation and practical learning.

The Underrated Power of Writing in Tech

Technical skills get attention but writing amplifies impact in cybersecurity. Clear communication bridges knowledge gaps and drives action across global tech teams.

AI Search Tools Threaten Publisher Survival

AI search engines reduce traffic to publishers, threatening content quality and cybersecurity. Learn actionable ways to support reliable sources and verify information.

Forced App Installations on Samsung Devices Pose Privacy Risks

Samsung's forced installations of apps in the WANA region highlight privacy risks and lack of user consent, with actionable steps to secure your device.

WordPress Motors Theme Vulnerability Compromises Admin Accounts

A flaw in the WordPress Motors theme is being exploited to hijack admin accounts globally. Learn actionable steps to secure your site against this threat.

When Fonts Become Spies What FreeType Zero Day Reveals

A FreeType font engine zero-day discovered by Meta was exploited globally to install Paragon spyware, revealing critical risks in open-source dependencies and the need for vigilant updates.

How Godfather Android Malware Builds Hidden Workspaces on Your Phone

The Godfather Android trojan creates hidden sandbox environments to bypass security measures, targeting global banking app users with actionable protection strategies.

WhatsApp Security Can Governments Really Access Your Messages

Exploring whether governments can access WhatsApp messages and practical steps to enhance personal security against sophisticated surveillance tools.

The Staggering Scale of Modern DDoS Attacks

A record-breaking 7.3 Tbps DDoS attack signals new defensive challenges and underscores why every organization needs layered protection strategies.

Meta AI Chat Privacy Concerns

Discover how Meta AI can accidentally expose your private chats and learn simple steps to protect your information.

Explore more

spot_img

Create a website from scratch

With Newspaper Theme you can drag and drop elements onto a page and customize them to perfection. Try it out today and create the perfect site to express yourself!