
Eric Bang – Founder & Cybersecurity Evangelist
Founder & Cybersecurity Evangelist
Decryption Digest
Eric Bang is a cybersecurity analyst specializing in CVE analysis, vulnerability intelligence, and threat research. He is a CISSP-certified professional and the founder of Decryption Digest — a high-signal threat intelligence publication read by over 50,000 security engineers, SOC analysts, CISOs, and IT administrators every week.
Eric translates complex vulnerability disclosures, ransomware campaigns, and nation-state operations into clear, actionable intelligence. His research spans zero-day analysis, BYOVD attack chains, supply chain compromise events, and critical CVEs affecting enterprise infrastructure — always with a focus on what security teams can do right now.
Credentials
Certified Information Systems Security Professional — ISC²
Decryption Digest — Cybersecurity threat intelligence for 50,000+ professionals
Zero-days, ransomware campaigns, nation-state operations, and critical CVEs
Author of 700+ practitioner guides, buyer's guides, and CVE analyses covering every major domain of enterprise cybersecurity.
Areas of Expertise
Research Topics
CVE Analysis & Vulnerability Intelligence
In-depth technical breakdowns of critical CVEs — covering exploit mechanics, CVSS scoring, affected versions, and step-by-step remediation.
- →CVE-2021-44228: Log4Shell Remote Code Execution
- →CVE-2023-34362: MOVEit Transfer SQL Injection
- →CVE-2023-4966: Citrix Bleed Session Hijacking
- →CVE-2022-0847: Dirty Pipe Linux Kernel Privilege Escalation
- →CVE-2021-4034: PwnKit Privilege Escalation
- →CVE-2020-1350: SigRed Wormable Windows DNS Server RCE
- →CVE-2025-0282: Ivanti Connect Secure Stack Overflow Zero-Day
- →CVE-2024-12356: BeyondTrust Privileged Remote Access RCE
Microsoft Vulnerability Research
Analysis of high-impact Microsoft CVEs exploited in the wild — from Exchange Server vulnerabilities to Windows kernel zero-days.
- →CVE-2021-34527: PrintNightmare Windows Print Spooler RCE
- →CVE-2021-26855: ProxyLogon Microsoft Exchange RCE
- →CVE-2021-40444: MSHTML Remote Code Execution
- →CVE-2022-30190: Follina MSDT Remote Code Execution
- →CVE-2023-23397: Outlook Zero-Click Credential Theft
- →CVE-2024-21413: MonikerLink NTLM Credential Leak
- →CVE-2024-38094: SharePoint RCE via Deserialization
Active Directory & Identity Attacks
Domain privilege escalation, credential theft, Kerberos abuse, and AD Certificate Services exploits — the most common post-exploitation path in enterprise environments.
Network Infrastructure & Zero-Day Research
Critical vulnerabilities in VPN appliances, firewalls, and remote access infrastructure actively exploited by nation-state actors and ransomware groups.
- →CVE-2019-19781: Citrix ADC Path Traversal RCE
- →CVE-2023-27997: FortiGate SSL VPN Heap Overflow
- →CVE-2022-1388: F5 BIG-IP Authentication Bypass RCE
- →CVE-2014-6271: Shellshock Bash Remote Code Execution
- →CVE-2017-0144: EternalBlue SMB Remote Code Execution
- →CVE-2022-3236: Sophos Firewall Code Injection (Chinese APT)
- →CVE-2024-4577: PHP CGI Argument Injection on Windows
- →CVE-2021-40539: ManageEngine ADSelfService Plus Auth Bypass RCE
- →CVE-2023-32315: Openfire Authentication Bypass RCE
Ransomware Operations & EDR Evasion
Technical analysis of ransomware group attack chains — BYOVD driver abuse, EDR silencing, double-extortion tactics, and initial access broker relationships.
Practitioner Guides & Buyer's Guides
In-depth practitioner guides and vendor comparison resources for security teams evaluating tools and building security programs.
- →NIST CSF 2.0 Implementation Guide
- →Penetration Testing Phases and Methodology
- →Vulnerability Management Program Best Practices
- →Ransomware Incident Response Playbook
- →Splunk vs Elastic SIEM: Full Comparison
- →Zero Trust vs VPN: Network Access Comparison
- →EDR vs XDR vs MDR: What's the Difference
- →How to Write Sigma Rules for Threat Detection
Recent Articles
View all →Get threat intelligence in your inbox
Join 50,000+ security professionals reading Decryption Digest — free, every week.