B-OPS Blog
Insights from the Field
Where does your data go during a pentest?
AI assistants are common in security work. Most clients have no idea their sensitive data may be travelling to infrastructure they've never vetted. Here's what to ask before you sign.
Read moreMickey De Baets
18 Feb, 2026
Building a Cloud Environment That Can Withstand Attackers
Azure Landing Zones provide a governance and security architecture designed to make cloud environments resilient against red-team activity and threat actors.
Read moreMickey De Baets
07 Dec, 2025
Cobalt Strike, MCPs, and the Illusion of "Push-Button Intrusions"
Exploring why MCP interfaces in Cobalt Strike don't enable sophisticated intrusions. Understanding the limitations of model-driven operations and why human expertise still matters.
Read moreMickey De Baets
26 Nov, 2025
Beyond user mode: How kernel drivers become attack vectors
Coming soon...
Read moreMickey De Baets
Coming soon...
Understanding reflection & shellcode injection in PowerShell
Coming soon...
Read moreMickey De Baets
Coming soon...