SecuriLee🇨🇭

Experienced Chief Information Security Officer and Security Consultant
As a seasoned CISO and security advisor, I understand that today’s cybersecurity landscape requires moving beyond simply saying “no” to business initiatives. My role focuses on enabling organizations by defining secure pathways forward and helping leadership calibrate their risk tolerance appropriately.
I specialize in risk visualization and assessment methodologies, utilizing balloon charts and “sleep-at-night” metrics to translate complex security concerns into actionable business intelligence. This approach helps organizations make informed decisions about which risks to accept, mitigate, or avoid.
Outside of my professional responsibilities, I maintain The OpenCanary Experience, a honeypot research project built on Thinkst’s OpenCanary platform, where I explore emerging threat detection techniques and contribute to the broader security community.

The OpenCanary Experience
SecuriLee🇨🇭 boosted:
2026-02-11

For years we've been told that grand juries in the US are just a rubber stamp for prosecutors (i.e. that they will indict even pork-based comestibles). But increasingly what we're seeing is that grand juries are the last line of defense against an administration that is hellbent on perverting the justice system. From the NYT:

"Federal prosecutors in Washington sought and failed on Tuesday to secure an indictment against six Democratic lawmakers who posted a video this fall that enraged President Trump by reminding active-duty members of the military and intelligence community that they were obligated to refuse illegal orders, four people familiar with the matter said."

"It was remarkable that the U.S. attorney’s office in Washington — led by Jeanine Pirro, a longtime ally of Mr. Trump’s — authorized prosecutors to go into a grand jury and ask for an indictment of the six members of Congress, all of whom had served in the military or the nation’s spy agencies."

"But it was even more remarkable that a group of ordinary citizens sitting on the grand jury in Federal District Court in Washington forcefully rejected Mr. Trump’s bid to label their expression of dissent as a criminal act warranting prosecution."

nytimes.com/2026/02/10/us/poli

2026-02-11

Curious what’s scraping my MIRE/C³ cluster?

See what attackers are probing for—and what happens when they try.

I’ve enabled live logging (last 50 lines visible). It should also help me stress-test the host if the traffic spikes…

mire.cc/live/

2026-02-11 15:48:20 [164.68.x.186] Resource served: /wp-content/plugins/shell/about.php Size 84 bytes Synthesised Delay 1.086s
2026-02-11 15:48:28 [164.68.x.186] Resource served: /wp-content/plugins/pwnd/pwnd.php Size 83 bytes Synthesised Delay 0.820s
2026-02-11 15:48:40 [164.68.x.186] Resource served: /wp-content/plugins/fix/up.php Size 81 bytes Synthesised Delay 1.279s
2026-02-11 15:48:51 [164.68.x.186] Resource served: /wp-content/plugins/ph-file-manager/wp-file.php Size 86 bytes Synthesised Delay 1.206s
2026-02-11 15:49:00 [164.68.x.186] Resource served: /wp-content/plugins/root-file-manager/wp-file.php Size 86 bytes Synthesised Delay 1.158s
2026-02-11 15:49:11 [164.68.x.186] Resource served: /wp-content/plugins/wp-help/mini.php Size 83 bytes Synthesised Delay 1.439s
2026-02-11 15:49:21 [164.68.x.186] Resource served: /wp-content/themes/travel/issue.php Size 84 bytes Synthesised Delay 1.428s
2026-02-11 15:49:33 [164.68.x.186] Resource served: /wp-content/themes/jaida/lang.php Size 83 bytes Synthesised Delay 1.575s
2026-02-06

The #opencanary MongoDB "authentic" trap is now running, it allows an unauthenticated attacker to dumb data and leave a ransom note.

I've not tested the exfiltrate logic but let's just say canary tokens and synthetic marmite is provided.

toce.ch/unauthenticated-mongod

MONGO WUZ HERE. ALL UR DATA R BELONG TO US. POOF! 😂

{"action": "mongodb.
ransomware_detected", "bitcoin_addresses": ["bclaxy2kgdygjrsqtzq2nyrf2493psakkfihxowlh"], "databases deleted": ["customers", "financial data", "orders"], "email addresses"
["decrypt_help@protonmail.com"], "ethereun addresses": ["6x742d35CC6634C0532925a3hg44BCA54e4438F44e"], "monero_addresses": [], "note length": 1397, "other contacts": [], "r
ansom_collection”: "WARNING", "ransom_db": "README_TO_DECRYPT", "ransom note": =========
==== MONGO WUZ HERE. ALL UR DATA R BELONG TO US. POOF!\n 
\n Your data is locked and cannot be recovered without our decryption key.\n \n PAYMENT REQUIRED: \n send 0.5 BTC to: bclqxyzkgdygjrsqtzq2nayrfaas
3pg3Kkkfihxewlh\n \n After payment, contact us:\n Email: decrypt_help@protonmail.com\n Telegram: @Decrypthow\n \n You have 72 hours or your data will be permanently deleted!\n \n DO NOT:\n - Contact authorities\n - Attempt recovery\n - Ignore this message
We have also exfiltrated your customer data including:\n - Credit card numbers\n - Email addresses \n - Financial records\n \n If you do not pay, this data will be sold on the dark web
2026-02-06

I think I created the next version in 27 minutes. I just need to test it, work got in the way....!! 💩

2026-02-06

I added my own #MongoDB stack to #OpenCanary in 41 minutes!!

It seems attackers care less about #MongoBleed and more about deployments facing the Internet and having no authentication.... 🤷‍♂️

toce.ch/opencanary-mongodb-hon

#AllUIRDataRBelongUs

A play on Mongo from Blazing Saddles, hacking a MongoDB.
Mongo wuz here 
All UR data R belong us.
Poof!
2026-01-27

@cloudflare I have a wonderful concept that would fit into the Cloudflare portfolio - is there someone that I could speak to about it?

2026-01-13

The probes and attacks on the MIRE/C³ cluster fall into many categories with some seeing large volumes of connection attempts and some with few connections (all connections being willingly served with MIRE content, of course).

See for yourself what attackers are trying to steal. On the MIRE/C³ cluster, they are "successful."

⏲️ :blobfacepalm:

mire.cc/types-of-attacks/

MIRE/C³ infographic
2026-01-07

The MIRE/C³ cluster statistics have been reset as the algorithm has been tweaked in the past week and the logging improved.

It's only cheap hits up to now but let's see the repeat visitors and those hauling archives from the cluster.

MIRE/C³: Misdirection causing Cost and Confusion

mire.cc/statistics/

The MIRE/C³ logo
2025-12-22

Christmas time is for giving. I give you The Mire - a gift for defenders and coal for the attackers.

A wall is a binary challenge—it either stands or it falls. But The Mire is a process of digital attrition. For two weeks, our server operated as a high-viscosity trap, transforming the attackers' own speed and automation into their greatest liability. In the world of "Hacker Treacle," the faster you try to move, the deeper you sink.

mire.cc/333-hours-of-mire/

#happychristmas everybody. I hope the hackers take the time off too.

Infographic covering 333 hours in hacker treacle
2025-12-18

The Mire is a defensive security system that shifts the economics of attack. Clients that ignore server directives are treated as hostile and met with cost and confusion—wasting time, compute, and analysis while serving convincingly real noise. #infosec #defensivesecurity

mire.cc/welcome-to-the-mire/

A vision of a rock festival afterwards, after it rained for days....
2025-12-16

Has the enshittification of social engineering arrived? I got this in one of my spam folders this morning....

Hello,

My name is Mavis L. Wanczyk, and I'm a jackpot winner in this fictional scenario.
In this sample letter, your email was randomly selected for a donation of USD $3,500,000.
Your sample Donation Code is: MV-75821.
Please reply with this code in this fictional context so the selection can be confirmed.

Warm regards,
Mavis L. Wanczyk

2025-12-03

If you have German-speaking friends, share this with them. It's German #sextortion from a "Chinese software developer".

Pay nothing to wallet bc1qyzeme0uwpfg283zvx7km0q7xe869pf6c6qa83r

How they will tremble until they read my breakdown.... 😂

ciso.li/german-sextortion-emai

A Chinese software developer sending German sextortion emails....
2025-11-28

#Shinterface - Nespresso style.

If I no speaky French, how do I get to an English interface?

shinterface.com/je-ne-parle-pa

Je ne parle pas Nespresso....
2025-11-28

#NordVPN for CHF19 at Digitec:
digitec.ch/en/s1/product/nordv

Digital code so it does not matter where you are....

Happy #BlackFriday 👍

2025-11-26

Since I get waves of semi-legitimate email (i.e. not spam but people thinking MY email address is THEIRS), I dug deeper and discovered that my Gmail address is in various breach databases BECAUSE OF THOSE PEOPLE.

Why don't companies actively verify email addresses? Ah, because it might cause attrition in the signup process.

:headbanger:

ciso.li/the-curious-case-of-my

A person at a laptop, patiently waiting for an email to come but it never will.
BECAUSE IT'S MY EMAIL ADDRESS!!!
2025-11-26

@codecat I just checked my XML logic, "null" is indeed "null" - because:

Testing for weak handling:
Some systems don’t validate usernames or passwords well. Attackers try "null" or "NULL" to see if the system treats it as a special value (like a null pointer or empty field), which can sometimes bypass authentication.

Brute-force automation defaults:
Automated tools often cycle through lists of common usernames. "null" is in some default attack lists because historically it has been accepted by misconfigured applications.

Database injections:
"null" can sometimes be used to try SQL injection or NoSQL injection attacks if the backend misinterprets string "null" as a literal null value.

Generic filler for unknown usernames:
Attackers may not know the target username, and "null" is a quick placeholder in automated scripts.

2025-11-26

@codecat "null" reads better than a blank, people stuff everything into a login interface.....

2025-11-26

@catsalad today it is, yes.
Amazing that the username has 8 chars, dontchathink? 😉

2025-11-26

I massively revamped my #opencanary dashboards showing the last 24 hours of attack attack attack.

What's possibly most interesting is that there is a great fluctuation in the hourly volumes.....steered automation at play?

The volume of attacks over 24 hours with the most popular IPs, usernames and passwordsThe OpenCanary honeypots are hit from various countries, on various ports and with different hourly volumes of connection attempts
2025-11-18

@GossiTheDog just last week they were ultrahappy about the 28Tbps attacks they fended off.

Let me guess, someone borked DNS? 😂

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst