2026
- [ 2026-02-26 ] The End of Online Anonymity? How LLMs Are Cracking the Code of Practical Obscurity
- [ 2026-02-21 ] Can a 7B Model Beat GPT-o3 at Finding Bugs? Meet VulnLLM-R
- [ 2026-02-16 ] Securing the Agentic Future: A Deep Dive into AI-Agent Protocol Threats
- [ 2026-02-14 ] Prompt Injection is Dead. Long Live Promptware: The 7-Stage Kill Chain
- [ 2026-02-09 ] Finding Backdoors in LLMs Using Their Own Memory
- [ 2026-02-05 ] Meet Co-RedTeam: How Multi-Agent AI is Automating Red Teaming
- [ 2026-02-02 ] Automating the Hackers: How AGENTICRED is Revolutionizing AI Red-Teaming
- [ 2026-01-15 ] Guarding the Bot: How AgentGuardian Secures AI Agents Using Learned Access Control
- [ 2026-01-08 ] The Art of Deception: How HoneyTrap Turns the Tables on LLM Jailbreakers
- [ 2026-01-01 ] The AI Weakness You Didn't Expect: Why Dark Patterns Are Fooling Your Smartest Agents
2025
- [ 2025-12-30 ] The Rookie Hacker: How LLMs are Leveling the Cybersecurity Playing Field
- [ 2025-12-30 ] Beyond the Receipt: How Agentic AI Can Build Self-Defending Software Supply Chains
- [ 2025-12-25 ] Automated Hiring is Broken: How Adversarial Prompts are Exploiting LLM Resume Screeners
- [ 2025-12-12 ] Unveiling the Challenges of Real-World AI Safety with TOXICCHAT
- [ 2025-12-12 ] BootKitty: Deconstructing the Ultimate Bootkit-Rootkit Hybrid
- [ 2025-12-10 ] Sift or Get Off the PoC: How SiftRank Uses LLMs to Find Vulnerabilities in a Haystack
- [ 2025-12-03 ] The Bard's Backdoor: How Poetry is Breaking AI Safety
- [ 2025-09-02 ] Why AI Hallucinates: Peering Inside the Transformer Brain
- [ 2025-06-25 ] A Journey Through Linux Kernel Memory Management
- [ 2025-06-01 ] Scaling Security Testing: Closing the Reachability Gap with LLM Agents
2024
- [ 2024-12-21 ] Kernel Diaries - Introduction
- [ 2024-11-05 ] Emulating Memory Sealing in Linux - A Deep Dive
- [ 2024-07-20 ] Understanding KASan: Fortifying Kernel Security with Advanced AddressSanitization
- [ 2024-07-07 ] Exploring Kernel Sanitizers: Enhancing System Stability and Security
2023
- [ 2023-10-29 ] Deconstructing macOS Security: Endpoint Detection and Hardening
- [ 2023-10-28 ] Deconstructing macOS Security: The Sandbox and TCC
- [ 2023-10-27 ] Deconstructing macOS Security: Code Signing and Notarization
- [ 2023-10-26 ] Deconstructing macOS Security: XNU, SIP, and The Ring Model