Welcome to the Endolum blog

We are opening a public space for the research, walkthroughs, and field notes that come out of running Sentinel and Hacked. This is what to expect.

announcement

Endolum runs Sentinel and Hacked for small companies across Switzerland. Most of what we learn day to day, the unpatched servers, the breach notifications that arrive in the wrong language, the recurring attacker patterns, never made it onto a public page. This blog is where it goes from now on.

What to expect

We will cover a few things in rotation.

  • Vulnerability writeups when something noisy hits Swiss companies and we can add real data to the conversation
  • Walkthroughs of attack patterns we see in customer environments, with sanitized telemetry
  • Tutorials on the basic moves that still keep most networks standing, or knock them over
  • Career notes for people building toward security work

The aim is to publish things you can actually use. A command, a detection rule, a checklist for the next time the same vulnerability resurfaces under a different CVE.

How we write

The pieces here come from people who do this work for a living. They will be direct, occasionally dry, and never padded for length. If a topic does not need 2000 words, it will not get them.

We do not run sponsored content and we do not write gated PDFs. The blog is the gift; the products are the business.

Stay close

New entries arrive when there is something worth saying. If you want the work behind the writing, run a free Sentinel scan on a domain you own, or read about the Hacked canary platform. Both inform what shows up here.

Welcome aboard.