So here are some links I’ve found mentioning GainSec or myself.
Note: I’m actively searching for the News Segment video I was in while I was at Leet Cyber Security, if you have a recording please send it my way!

Know of one I didn’t find?
Please send it to info@gainsec.com!
Multiple Links relating to my first two CVEs I discovered, CVE-2017-16744 and CVE-2017-16748 – US-CERT Advisory – SecurityFocus – NIST 1 – NIST 2 – VulDB 1 – VulDB 2 – Blog Post
Post I made via my previous day Job about my CVEs – Link
Albany NY Magazine Article – Link
Archive of New Segment I was in during my time at Leet (Looking for the video that went along with this segment!!) – Preview Link – Full Article (Minus the Video)
Alumni Story from Herkimer Community College (HCC) – Link
Full spread from Herkimer Alumni Connections Magazine – Mirror – Link
Featured under the Cyber Security Degree Listing of HCC – Link
Quoted and mentioned on the SUNY Online Cyber Security Program Listing – Link
Archive of IronGeek Links from ANYCon – Link
Interview with Security Weekly – Link – GainSec Reupload
Lecture posted on IronGeek.com – Link – GainSec Reupload
Lecture from ANYCon posted by Leet Cyber Security – Link – GainSec Reupload
Lecture From CyBEER posted by Leet Cyber Security – Link – GainSec Reupload
Link-Base Listings – Link
STOK – YouTube – GainSec GoldenNuggets Shoutout – Link
InfoSec Pat – YouTube – Nerd Talk week 10 – Link
InfoSec Pat – YouTube – Nerd Talk week 12 – Link
Swiping Sunday Podcast – Featuring GainSec – Link
Execs Need Less Talk, More Action on Software Security – Link
Spoofing Bug Highlights Cybersecurity for Digital Vaccine Passports – Mirror – Link
NTFS Support in new Linux kernel promises to make new release more cryptographically sound – Link
Report highlights cybersecurity dangers of Elastic Stack implementation mistakes –Mirror – Mirror – Mirror – Mirror – Link
Widespread Elastic stack API security vulnerability – Link
Easily exploited Elastic Stack API security flaw exposes data – Link
‘Trojan Source’ a Threat to All Source Code, Languages – Link
Industry Reactions to New ‘Trojan Source’ Attack: Feedback Friday – Link
3 Ways to Deal With the Trojan Source Attack – Link
‘Trojan Source’ technique can inject malware into source code without detection – Link
‘Trojan Source’ Hides Invisible Bugs in Source Code – Link
Why VMware Horizon became a ‘top choice’ for Log4j attacks – Link – Mirror – Mirror – Mirror
Threat actors target MFA token via man-in-the-middle attacks – Link
Increasing Adoption of Phishing Kits Puts MFA at Risk – Link – Mirror
How to Find a Data Leak in 50 Easy Steps (Blog post from my day job) – Link
Microsoft: Key Office apps will block macros by default – Link
Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol – Link
Nearly 50% of all SaaS-to-SaaS integrations sit unused following a failed POC effort – Link
Messaging Apps That Are Secure: Signal vs. WhatsApp – Link
CVE-2022-34108 – Blog Post Coming Soon!
CVE-2022-34615 – Blog Post Coming Soon!
CVE-2022-34621 – Blog Post Coming Soon!
CVE-2022-34623 – Blog Post Coming Soon!
CVE-2022-34624 – Blog Post Coming Soon!
CVE-2022-34109 – Blog Post Coming Soon!
CVE-2022-34110 – Blog Post Coming Soon!