Skip to content

Automatic translation from Russian to English. It may contain inaccuracies.

Posts

It happens that you sit down to write a post and... emptiness. It would seem that there i…

August 23, 2025 at 8:02 PMMax Knyazev is typing…Telegram mirror
Post image 1
It happens that you sit down to write a post and... emptiness. It would seem that there is enough cybersecurity in the world: vulnerabilities, bugs, fresh attacks, IoT is strange in its own way. But sometimes I just want to share my thoughts

Today I caught myself doing something strange. I read news from the information security world and increasingly think: we live in an era where threats are no longer surprising. Tesla hacked via Bluetooth? Well ok. Has a new botnet emerged? Yes, I can read such news every day. Even the recent hacks of Aeroflot or the pharmacy chain, which just a few weeks ago made noise literally everywhere. And I even wanted to prepare a detailed post at some point to talk about the latest high-profile attacks. But then I thought, “Why?” So much has already been said about this and by such a huge number of people that I can hardly add anything new on my own. The human brain stops responding to “sensations” because it is no longer a sensation 🧐

And here I ask myself: what will happen next? Maybe in a couple of years we will be really impressed not by the attacks, but by the fact that “they tried, but it didn’t work”? Well, let’s say someone does it so well that even a serious and complicated attack will be successfully repelled ( although the question remains, how will we know about this then? )

All this means that sometimes in the world of information security you don’t want just another news about a new exploit, but some kind of hope. And yes, this does not mean that something wrong is happening in the world. This means that we are already accustomed to living in this digital chaos. How could it be otherwise? 👏

#information_security
Open original post on Telegram

Connection graph

How this work connects to others

No explicit connections have been configured for this work yet. You can still open the full graph or the timeline of all works.

Hover over a line to see what connects one work to another.

Use the mouse wheel to zoom the graph and drag it like a map.

Post
100%

Discussion

Comments

Comments are available only to confirmed email subscribers. No separate registration or password is required: a magic link opens a comment session.

Join the discussion

Enter the same email that you already used for your site subscription. We will send you a magic link to open comments on this device.

There are no approved comments here yet.