Trying to adapt the new normal of Artificial Intelligence creeping into the software development field.

There are some pretty rapid developments in the field of software development with the advent of artificial intelligence. Adapting to these changes means you will have to try and change rapidly.

Below I have written a brief article on how you could adapt to these changes. Now, obviously, I am going through this as well so over time I may update this list on this website as I discover ways that others can adapt to this new reality.

Adapting to the adoption of artificial intelligence (AI) in fields like software development and information security requires a combination of upskilling, mindset shifts, and proactive engagement with emerging technologies. Here are some strategies for professionals in the technology field to adapt effectively:

  1. Continuous Learning and Skill Development: Stay updated with the latest advancements in AI technologies and their applications in your field. This may involve enrolling in relevant courses, attending workshops, participating in online forums, or pursuing certifications in AI and machine learning.
  2. Embrace Automation and Augmentation: Understand that AI is not here to replace human workers entirely but rather to augment their capabilities. Embrace automation tools and AI-powered platforms that can streamline repetitive tasks, freeing up time for more creative and strategic endeavors.
  3. Collaborate with AI Systems: Instead of viewing AI as a threat, collaborate with AI systems to enhance productivity and efficiency. Learn how to leverage AI algorithms and tools to optimize software development processes, improve code quality, or strengthen cybersecurity measures.
  4. Adopt AI-Driven Development Practices: Explore AI-driven development practices such as AI-assisted coding, which can help software developers write better code faster. Similarly, in information security, utilize AI-powered threat detection and response systems to bolster cybersecurity defenses.
  5. Enhance Data Literacy: AI heavily relies on data, so improving your data literacy skills is essential. Understand how to collect, clean, analyze, and interpret data effectively to derive meaningful insights and make informed decisions.
  6. Focus on Creativity and Problem-Solving: While AI can handle routine tasks, human creativity and problem-solving skills remain invaluable. Cultivate these skills to tackle complex challenges, innovate new solutions, and add unique value to your projects.
  7. Ethical Considerations: As AI becomes more pervasive, it’s crucial to consider the ethical implications of its use. Stay informed about ethical guidelines and best practices for AI development and deployment, and advocate for responsible AI adoption within your organization.
  8. Stay Agile and Adaptive: The technology landscape is constantly evolving, so cultivate an agile mindset and be prepared to adapt to new developments and trends in AI and related fields.
  9. Networking and Collaboration: Engage with peers, industry experts, and AI enthusiasts through networking events, conferences, and online communities. Collaborate on AI projects, share knowledge, and learn from others’ experiences to accelerate your AI learning journey.
  10. Stay Curious and Open-Minded: Approach AI adoption with curiosity and an open mind. Be willing to experiment with new technologies, learn from failures, and adapt your strategies based on feedback and evolving best practices.

By adopting these strategies, professionals in the technology field can effectively adapt to the increasing adoption of AI and position themselves for success in a rapidly evolving digital landscape.

Now, these are just some of the ideas that came to mind. They may seem obvious to many but implementing them in practice takes a lot of work. Hopefully, since you know these changes are coming you can start to develop a backup plan or other means of making a living. Remember, your job shouldn’t define who you are but rather what you can contribute to this world.

As a software developer you can solve problems and think rationally and logically, that means you should be valuable as an employee regardless of what happens. Eventually, software developers may become even more valuable than they are now as software development becomes highly specialized.

Using Memory Safe Techniques to Build an Operating System and Software.

Recently, the current administration recommended that software developers produce code or rather try to re-write their software in such a manner that uses memory safe languages and techniques. Given this assertion I have some thoughts on this matter and whether or not it is feasible or would the drawbacks on performance outweigh the benefits to overall security of the operating system and installed software.

In the realm of operating systems, security and reliability are paramount concerns. Traditional operating system kernels, while powerful, often rely on languages like C and C++, which are prone to memory-related vulnerabilities such as buffer overflows and dangling pointers. These vulnerabilities can lead to system crashes, security breaches, and even full system compromise. In response to these challenges, there has been increasing interest in exploring the feasibility of developing an operating system kernel using memory-safe techniques or languages. In this article, we’ll delve into the potential pitfalls and advantages of such an endeavor.

Memory-Safe Techniques and Languages

Memory safety is the concept of preventing programming errors that can lead to memory corruption vulnerabilities. Memory-safe languages such as Rust, Swift, and managed languages like Java and C# employ various techniques to ensure memory safety, including:

  1. Memory Ownership: Rust, for example, uses a system of ownership and borrowing to enforce memory safety at compile time. This prevents issues such as dangling pointers and data races.
  2. Automatic Memory Management: Languages like Java and C# feature garbage collection, which automatically de allocates memory that is no longer in use, thus eliminating common memory management errors.
  3. Bounds Checking: Some languages automatically perform bounds checking on arrays and other data structures to prevent buffer overflows.

Advantages of a Memory-Safe Operating System Kernel

  1. Enhanced Security: By eliminating common memory-related vulnerabilities, a memory-safe operating system kernel can significantly improve overall system security. This reduces the likelihood of successful attacks such as buffer overflow exploits.
  2. Improved Reliability: Memory safety techniques can enhance the reliability of the operating system by minimizing the occurrence of crashes and system instability caused by memory corruption issues.
  3. Easier Maintenance and Debugging: Memory-safe languages often provide better tooling and error messages, making it easier for developers to identify and fix issues during development. This can streamline the maintenance and debugging process for the operating system kernel.
  4. Future-Proofing: As software complexity continues to increase, the importance of memory safety becomes more pronounced. By adopting memory-safe techniques early on, an operating system kernel can better withstand the challenges of evolving threats and software demands.

Potential Pitfalls and Challenges

  1. Performance Overhead: Memory-safe languages often incur a performance overhead compared to low-level languages like C and C++. While advancements have been made to mitigate this overhead, it remains a concern for resource-constrained environments.
  2. Compatibility Issues: Porting an existing operating system kernel to a memory-safe language or developing a new one from scratch may introduce compatibility issues with existing hardware, drivers, and software ecosystem.
  3. Learning Curve: Memory-safe languages, especially ones like Rust with unique ownership and borrowing concepts, have a steeper learning curve compared to traditional languages. This may require developers to undergo additional training and adjustment.
  4. Runtime Overhead: Some memory-safe languages, particularly those with garbage collection, introduce runtime overhead, which may not be acceptable for real-time or performance-critical systems.

Developing an operating system kernel using memory-safe techniques or languages presents both significant advantages and challenges. While the enhanced security, reliability, and maintainability offered by memory-safe languages are appealing, concerns such as performance overhead and compatibility issues must be carefully addressed. Nonetheless, as the importance of security and reliability in operating systems continues to grow, exploring the feasibility of memory-safe operating system kernels remains a worthwhile pursuit with the potential to reshape the future of computing.

Potential Security Risks in the new Microsoft Co-Pilot. and how to mitigate them.

Microsoft just today released a new product called Co-Pilot in the Windows 11 operating system. As paranoid security researcher I couldn’t help but think of the potential security threats this could subject every single user to.

A project like Copilot, an AI companion, could potentially have several security vulnerabilities that bad actors might attempt to exploit. Here are some potential vulnerabilities and mitigation strategies:

  1. Data Privacy and Leakage:
  • Vulnerability: Copilot may handle sensitive information about its users. If this data is not properly protected, it could be accessed by unauthorized parties.
  • Mitigation: Implement strong encryption for data in transit and at rest. Use secure authentication methods and access controls to ensure only authorized users can access sensitive data. Regularly audit and review data handling processes for compliance with privacy regulations.
  1. Malicious Input and Attacks:
  • Vulnerability: Copilot may interact with users through text or voice. Bad actors might try to inject malicious code or trick the AI into providing sensitive information.
  • Mitigation: Implement robust input validation and sanitization to prevent code injection and other forms of malicious input. Employ Natural Language Processing (NLP) models for intent recognition and context-aware responses to detect and mitigate potentially harmful requests.
  1. Phishing and Social Engineering:
  • Vulnerability: Bad actors may attempt to manipulate users by impersonating Copilot or providing misleading information.
  • Mitigation: Educate users about common phishing tactics and provide clear instructions on how to verify the identity of Copilot. Implement multi-factor authentication and employ techniques like CAPTCHAs to thwart automated attacks.
  1. Denial-of-Service (DoS) Attacks:
  • Vulnerability: A high volume of requests or traffic could overwhelm the system, causing it to become unresponsive.
  • Mitigation: Implement rate limiting, load balancing, and caching mechanisms to handle spikes in traffic. Employ DDoS protection services and monitor for unusual activity patterns.
  1. Model Exploitation:
  • Vulnerability: Adversaries may attempt to exploit vulnerabilities in the underlying machine learning models to manipulate or deceive the AI.
  • Mitigation: Continuously monitor for model performance and anomalies. Employ adversarial testing to identify and mitigate potential model vulnerabilities. Regularly update and retrain models to stay resilient against evolving threats.
  1. Third-Party Integrations:
  • Vulnerability: Integrations with external services or APIs may introduce security risks if not properly vetted or maintained.
  • Mitigation: Thoroughly assess the security of third-party services and conduct regular security audits. Implement proper authentication and authorization mechanisms for external integrations.
  1. Software Vulnerabilities:
  • Vulnerability: Copilot may rely on various software components and libraries, which could have their own vulnerabilities.
  • Mitigation: Keep all software dependencies up-to-date and regularly apply security patches. Conduct thorough code reviews and employ static code analysis tools to identify and address potential vulnerabilities.
  1. User Education and Awareness:
  • Vulnerability: Users may inadvertently expose sensitive information or fall victim to scams if they are not adequately informed.
  • Mitigation: Provide clear instructions on best practices for using Copilot securely. Offer user training and awareness programs to educate them about potential risks and how to avoid them.

Regular security audits, penetration testing, and ongoing monitoring for suspicious activities are crucial aspects of maintaining the security of a project like Copilot. Additionally, having a dedicated incident response plan in case of a security breach is essential for timely and effective mitigation.

Of course, this is just a hypothetical breakdown of the potential risks of using Microsoft Co-Pilot. Now, during the presentation it was brought to light that Microsoft is attempting to mitigate some of these risks by using Passkeys and other measures.

Only time will tell how vulnerable Microsoft Co-Pilot will make us in the future. I believe technology can help us, but I believe it is better to be more self reliant and not dependent upon tools and gadgets.

What are the top blue team tools used in CyberSecurity?

There are several defensive (blue team) tools that cybersecurity professionals use to protect their organizations from cyber attacks. Some of the top tools are:

  1. SIEM (Security Information and Event Management) – SIEM solutions collect, analyze, and correlate data from different sources to detect and respond to security threats.
  2. IDS/IPS (Intrusion Detection/Prevention System) – IDS/IPS solutions monitor network traffic for signs of malicious activity and can either alert security teams or block the traffic outright.
  3. Endpoint Protection – Endpoint protection software provides security for endpoints such as laptops, desktops, and servers, and can detect and block malware, ransomware, and other threats.
  4. Vulnerability Scanners – Vulnerability scanners identify vulnerabilities in systems and applications and report them to security teams for remediation.
  5. Firewalls – Firewalls block unauthorized access to a network or system by examining traffic and blocking traffic that doesn’t meet the firewall’s rules.
  6. DLP (Data Loss Prevention) – DLP solutions prevent sensitive data from leaving an organization by monitoring and controlling data transfers.
  7. Security Analytics – Security analytics solutions use machine learning and other techniques to analyze data and detect security threats in real-time.
  8. Deception Technology – Deception technology creates decoy systems and data to lure attackers away from the organization’s real systems and data.
  9. Identity and Access Management (IAM) – IAM solutions manage user identities and access to systems and applications, ensuring that only authorized users can access sensitive data.
  10. Threat Intelligence – Threat intelligence solutions provide information on the latest threats and vulnerabilities to help security teams better protect their organizations.

CyberSecurity Roles: Why you should consider both Blue and Red Team Roles?

As the field of cybersecurity continues to grow, there is a growing demand for professionals who are skilled in both offensive and defensive security tactics. While offensive security (commonly referred to as “red teaming”) is often seen as the more glamorous and exciting side of cybersecurity, it is essential to recognize the critical role of blue team tactics in protecting against cyber threats.

In this article, we will explore why individuals studying offensive security should consider learning blue team tactics and how it can benefit their career in cybersecurity.

What is Blue Teaming?

Blue teaming refers to the defensive side of cybersecurity, which involves protecting systems and networks from cyber-attacks. Blue team members work to identify vulnerabilities in a system, develop and implement security measures, and monitor and respond to security incidents.

Blue teaming tactics involve a wide range of activities, including network monitoring, threat hunting, vulnerability management, incident response, and security assessments. These activities are critical for maintaining the security of a system or network and mitigating cyber threats.

Why Learn Blue Teaming Tactics?

  1. Understanding the Other Side

As an offensive security professional, learning blue team tactics can help you gain a better understanding of the other side of the coin. By understanding how defenders operate, you can better anticipate their responses and create more effective attack strategies. This understanding can also help you develop more robust and resilient systems that can withstand attacks.

  1. Enhancing Your Skill Set

Learning blue team tactics can expand your skill set and make you a more well-rounded cybersecurity professional. Many of the skills and techniques used in blue teaming, such as network monitoring and incident response, are transferable to offensive security. By mastering these skills, you can become a more versatile and effective cybersecurity professional.

  1. Job Opportunities

As the demand for cybersecurity professionals continues to grow, many employers are seeking individuals with both offensive and defensive security skills. By learning blue team tactics, you can increase your employability and stand out in a competitive job market. Additionally, having experience in both offensive and defensive security can lead to higher-paying job opportunities.

  1. Improved Cybersecurity Awareness

Understanding blue team tactics can also help you develop a more holistic approach to cybersecurity. By understanding the methods and techniques used to protect against cyber threats, you can better identify potential vulnerabilities in a system or network. This knowledge can help you develop more effective attack strategies and make you a more effective cybersecurity professional overall.

  1. Ethical Considerations

As a responsible cybersecurity professional, it is essential to consider the ethical implications of your actions. By learning blue team tactics, you can gain a better understanding of the impact of cyber-attacks on individuals and organizations. This understanding can help you develop more ethical and responsible offensive security strategies.

While offensive security is undoubtedly exciting, it is essential to recognize the importance of blue team tactics in protecting against cyber threats. By learning blue teaming, individuals studying offensive security can expand their skill set, gain a better understanding of the other side, increase their employability, and develop a more holistic approach to cybersecurity. Ultimately, by combining offensive and defensive security skills, cybersecurity professionals can become more effective in protecting against cyber threats and making the digital world a safer place.

Paying for a DDOS Attack? Why you should never consider this as an option!

The reason that prompted this article is that one of the Twitch streamers who also stream on YouTube was attacked by a DDOS attack while broadcasting. You should know that doing this type of attack on someone you may not like can and will result in severe legal penalties.

If you are caught paying for or carrying out a DDoS attack, you could face criminal charges such as computer fraud, hacking, and cyberstalking.

It is important to note that paying for or carrying out a distributed denial-of-service (DDoS) attack on someone, even if you may not like them, is illegal and can result in severe legal consequences. A DDoS attack involves flooding a target’s network or website with an overwhelming amount of traffic, rendering it inaccessible to users.

If you are caught paying for or carrying out a DDoS attack, you could face criminal charges such as computer fraud, hacking, and cyberstalking. These charges carry hefty fines, imprisonment, and damage to your reputation and future employment opportunities. In some cases, the victim may also be able to file a civil lawsuit against you, seeking damages for the harm caused.

In the case of trying to DDoS someone off of broadcasting on Twitch or YouTube, it is important to note that these platforms have strict guidelines and policies against such behavior. Attempting to DDoS a streamer or content creator on these platforms can result in suspension or permanent termination of your account, as well as legal consequences.

In addition to the potential legal consequences, paying for or carrying out a DDoS attack can also have serious ethical implications. It is important to respect the privacy and online security of others and to resolve conflicts through legal and ethical means rather than resorting to cyber attacks.

It is never legal or ethical to carry out or pay for a DDoS attack on someone, regardless of the reason. Such behavior can result in serious legal consequences, as well as damage to your reputation and future opportunities. It is important to respect others’ privacy and security online and to resolve conflicts through appropriate channels.

Ethical and Legal Considerations of War Driving: What you need to know!

As technology continues to advance, the need for ethical hacking has become more important. One such activity that ethical hackers may engage in is “war driving.” Wardriving involves driving around in a vehicle with a laptop or other device that can detect wireless networks, in an attempt to identify vulnerabilities in those networks. While wardriving can be a useful tool for ethical hackers, there are a number of ethical and legal considerations that must be taken into account before engaging in this activity.

Legal Considerations

The first and most important consideration when it comes to war driving is the legality of the activity. In many countries, it is illegal to access wireless networks without authorization. Even if the network is unsecured, accessing it without authorization can still be considered a criminal offense. Therefore, before engaging in war driving, it is important to research the laws in your jurisdiction and ensure that you are not breaking any laws.

In addition to legal considerations, it is also important to consider the ethical implications of war driving. Ethical hackers have a responsibility to act in the best interests of their clients or the public at large. Therefore, it is important to ensure that your actions do not cause harm or violate the privacy of others.

Ethical Considerations

One of the main ethical considerations when it comes to war driving is the potential impact on the privacy of individuals and organizations. By accessing wireless networks without authorization, ethical hackers may be able to access sensitive information that could be used for malicious purposes. Therefore, it is important to ensure that the information obtained during war driving is used only for ethical purposes and that any vulnerabilities identified are reported to the appropriate parties.

Another ethical consideration when it comes to war driving is the potential impact on the stability of wireless networks. By accessing networks without authorization, ethical hackers may inadvertently cause disruptions to those networks. Therefore, it is important to ensure that the tools used for wardriving are used responsibly and that any disruptions are kept to a minimum.

Finally, it is important to consider the potential impact on the reputation of ethical hacking as a profession. If war driving is seen as a nefarious activity, it could damage the reputation of ethical hacking as a whole. Therefore, it is important to ensure that wardriving is conducted in a responsible and ethical manner and that any vulnerabilities identified are used only for the benefit of the clients or the public.


Wardriving can be a useful tool for ethical hackers, but it is important to consider the legal and ethical implications of this activity before engaging in it. By ensuring that the activity is conducted in a responsible and ethical manner, ethical hackers can help to promote the credibility of their profession and contribute to the security of wireless networks.