Archives
- 18 Apr Qwen3.6 on 24GB VRAM: Benchmark, Config, and Every Mistake
- 03 Apr AI Agents: The Security Course Nobody Taught You
- 02 Apr RSAC 2026 Confirmed It: Agentic AI Security Is the Industry's Next Unsolved Problem
- 02 Apr When Infostealers Meet Agentic AI: The Kill Chain Security Teams Aren't Modeling
- 01 Apr AI Agents Are Widening the EU AI Act Readiness Gap
- 30 Mar Building a Cybersecurity AI Agent From Scratch
- 27 Mar RAG Poisoning and EU AI Act Article 10: Data Governance Is Not Optional for Retrieval Pipelines
- 18 Mar GPAI Meets Agentic AI: Why Your MCP Deployment Triggers EU AI Act Obligations
- 16 Mar MCP Security Top 10: A Practitioner's Threat Model
- 15 Mar RAG Stack Security: Defenses That Stop Real Attacks
- 12 Mar RAG Poisoning: How Attackers Corrupt Your AI's Knowledge Base
- 08 Mar RAG Security: Attacks, Defenses & Architecture
- 06 Mar Red Teaming Agentic AI: CISO Playbook with Checklists and Assessment Templates
- 05 Mar LLM Red Teaming Tools: PyRIT & Garak (2025 Guide)
- 04 Mar How I Deployed OpenClaw as an AI Security Researcher: A Practitioner's Guide
- 03 Mar Attacking Docker Desktop via MCP: From Theory to PoC
- 26 Feb Tool Poisoning in MCP: Hidden Instructions, Silent Exfiltration
- 25 Feb MCP's First Year: What 30 CVEs and 500 Server Scans Tell Us About AI's Fastest-Growing Attack Surface
- 24 Feb OWASP Agentic Top 10 in Practice: MCP Tool Poisoning, Cross-Server Attacks, and the DockerDash Incident
- 20 Feb Your AI Agent Just Became an Attack Surface — And Most Teams Don't Know It Yet
- 17 Feb AI Agent Evaluation: Frameworks & Metrics for Production Systems
- 02 Feb LLM Engineering Part 3, From Basic LLM App to Production SaaS MVP
- 31 Jan Build Production-Ready LLM Agents
- 26 Jan LLM-Engineering; Building a Procurements Analyst AI
- 18 Dec One-File Procurement “AI Analyst” with LLM Engineering
- 11 Jul The Hidden Security Risk in AI Integrations
- 21 May The $430,000 Kubernetes Mistake: How Security Debt Nearly Killed My Homelab (And What It Means for Your Business)
- 18 Apr Git-Based Risk Assessments: A Developer-Centric Approach to Security at Scale
- 15 Apr How you Should Deploy and Use Postgres in Kubernetes
- 05 Apr How You Should Manage Secrets in Kubernetes
- 05 Mar Building a Production-Ready Kubernetes Cluster with Infrastructure as Code and GitOps