I research the human attack surface — phishing campaigns, social engineering, scam infrastructure, and threat actor tactics — to help defenders understand how people get compromised.
An analysis of social engineering scripts and pretext frameworks used by organized scam operations — how they establish rapport, manufacture urgency, and exploit cognitive biases to extract credentials and payments from victims.
Deep dive into a phishing kit targeting local banking customers — infrastructure pivots, lookalike domain patterns, evasion techniques, and IOCs for detection. Includes actor TTP mapping and campaign timeline reconstruction.
// More writeups coming soon
I'm Ken Adriano, a threat intelligence researcher focused on the human attack surface — specifically how threat actors use social engineering, phishing, and scam tactics to exploit trust rather than technology.
My work covers phishing kit analysis, scam infrastructure mapping, actor profiling, and TTP documentation. I dig into real campaigns, trace infrastructure, and extract actionable intelligence that blue teams can actually use.
I'm currently looking for full-time opportunities in threat intelligence, fraud analysis, or security research where deep knowledge of the human vector matters. If you're working on hard problems in this space — let's talk.
Open to full-time roles in threat intel, email security, or incident response. Feel free to reach out directly — I respond within 24 hours.