
FYI:
This page is not mobile friendly.
This page is not mobile friendly.
Cyvonis Working Blog
At Cyvonis, this blog highlights the work we handle daily — OSINT investigations, large-scale data aggregation, mobile vulnerability research, field-tested network monitoring, and intelligence methods that leverage existing public infrastructure. You’ll see everything from high-volume ML labeling experiments to car-forensics analysis, as well as the odd behaviors, edge-case failures, and overlooked attack surfaces we uncover across devices, apps, and networks.
We focus on the wrong threats while overlooking how existing public infrastructure already works as city-wide surveillance.
Coming Soon… We traced a coordinated group exploiting the payment-card interchange settlement. Their internal scripts, onboarding, and performance system will be detailed in our upcoming report.