The Cyber Desk
Writing & notes.
Field notes from running a malware reverse engineering team — technical pieces on the work itself, and reflections on leading the people who do it.
April 21, 2026
Notes on Byte-Transformer Models for Detecting EDR-Evading Malware
How we trained an in-memory detection agent on raw bytes — and what surprised us about generalization to unseen packers.
AI / MLMalware AnalysisEDRFebruary 10, 2026
Building a Follow-the-Sun Reverse Engineering Team
What I learned building a global RE team that hands off live malware incidents across three time zones — and the parts I’d do differently.
LeadershipIncident ResponseThreat IntelNovember 7, 2025
What the C-Suite Actually Wants to Hear About Ransomware
After dozens of executive briefings during active incidents, three things matter — and threat intelligence is usually not one of them.
Executive CommunicationIncident ResponseRisk