The Insider Weekly #6 - Building the Next ChatGPT | Network Pentesting | Full-blown Winter
I was looking over last week’s email, trying to find a pattern in my writing. I usually tell you about random aspects of my life that have nothing to do with work, then a little bit of my work in cybersecurity, machine learning, and the creative process. And I conclude with a list of resources I consider worth checking out. Now I come to ask if there’s anything that you’d like me to write more about. To vote, please subscribe (free).
Starting off with machine learning and AI. I think I’ve told in previous batches of this newsletter that I’m heavy on studying and refreshing my knowledge of ML algorithms. Moreover, I’ve developed a 6-month learning plan for AI Large Language Models (LLMs), the stuff that’s behind ChatGPT. You can read and adopt this plan yourself. If you do, let me know by replying to this email.
If you’ve been following my work closely, you know I’m a huge believer in practicality. On that note, I had a very long discussion with a close friend last weekend, brainstorming ideas for building an ML-powered product or app. You’ll be the first to know when the app or the product is born. It may be cybersecurity related.
Now, when it comes to my work in cybersecurity, this week I’ve been overloaded with projects, short and long-term. For one, I’m doing a pentest for a client on a financial app. I’m happy to say that I found a very critical vulnerability in an area that I usually don’t focus too much on. And this gave me a boost in confidence.
Secondly, I’m doing multiple appsec assessments with one of my older clients, which brings me much joy because I love losing myself in deep work.
Thirdly, I accepted a pentest with a new client, that’s in an area where I want to grow my skills (network pentesting). So, I’m approaching skill development from multiple perspectives.
Fourthly, I received an RFP (request for proposal) from another potential client. This client approached me directly via email, after having been reported a vulnerability via a private bug bounty program last year.
Fifthly, I’m closing in on a promotion/sponsorship with someone that wants to bring awareness to their API solution. More on this later. And I’ve also signed a contract with a learning platform where I will be publishing one of my practical courses. I will be more specific with everything I said here as things are starting to move forward.
I’ve been away (out of the city) for the past few days. This has always been refreshing when it comes to my perspective and the bigger picture of things.
Winter finally arrived in Romania by the end of January. Snow scenery has always brought me joy. Though I need to drive back home tomorrow, so I’m not very much looking forward to that.
Other:
I sold and bought more stocks this past week. The usual culprits: are Microsoft, Tesla, Nvidia, and Cloudflare.
I found phind.com, another search engine powered by AI, which you can interact with naturally.
I dove deep into investigating access control vulnerabilities in cybersecurity. Here’s a blog that you can use as a starting point if you want to do the same.
I wrote this Twitter thread on Top Python Libraries used by Hackers. Also made it as a 59-second video.
Now, going back into the trenches. See you in batch #7.