2026
- [ 2026-02-05 ] Meet Co-RedTeam: How Multi-Agent AI is Automating Red Teaming
- [ 2026-02-02 ] Automating the Hackers: How AGENTICRED is Revolutionizing AI Red-Teaming
- [ 2026-01-15 ] Guarding the Bot: How AgentGuardian Secures AI Agents Using Learned Access Control
- [ 2026-01-08 ] The Art of Deception: How HoneyTrap Turns the Tables on LLM Jailbreakers
- [ 2026-01-01 ] The AI Weakness You Didn't Expect: Why Dark Patterns Are Fooling Your Smartest Agents
2025
- [ 2025-12-30 ] The Rookie Hacker: How LLMs are Leveling the Cybersecurity Playing Field
- [ 2025-12-30 ] Beyond the Receipt: How Agentic AI Can Build Self-Defending Software Supply Chains
- [ 2025-12-25 ] Automated Hiring is Broken: How Adversarial Prompts are Exploiting LLM Resume Screeners
- [ 2025-12-12 ] Unveiling the Challenges of Real-World AI Safety with TOXICCHAT
- [ 2025-12-03 ] The Bard's Backdoor: How Poetry is Breaking AI Safety
- [ 2025-09-02 ] Why AI Hallucinates: Peering Inside the Transformer Brain
- [ 2025-06-25 ] A Journey Through Linux Kernel Memory Management
- [ 2025-06-01 ] Scaling Security Testing: Closing the Reachability Gap with LLM Agents
2024
- [ 2024-12-21 ] Kernel Diaries - Introduction
- [ 2024-11-05 ] Emulating Memory Sealing in Linux - A Deep Dive
- [ 2024-07-20 ] Understanding KASan: Fortifying Kernel Security with Advanced AddressSanitization
- [ 2024-07-07 ] Exploring Kernel Sanitizers: Enhancing System Stability and Security