LLM 16
- MCP Security Top 10: A Practitioner's Threat Model
- RAG Stack Security: Defenses That Stop Real Attacks
- RAG Poisoning: How Attackers Corrupt Your AI's Knowledge Base
- RAG Security: Attacks, Defenses & Architecture
- Red Teaming Agentic AI: CISO Playbook with Checklists and Assessment Templates
- LLM Red Teaming Tools: PyRIT & Garak (2025 Guide)
- Attacking Docker Desktop via MCP: From Theory to PoC
- Tool Poisoning in MCP: Hidden Instructions, Silent Exfiltration
- MCP's First Year: What 30 CVEs and 500 Server Scans Tell Us About AI's Fastest-Growing Attack Surface
- OWASP Agentic Top 10 in Practice: MCP Tool Poisoning, Cross-Server Attacks, and the DockerDash Incident
- Your AI Agent Just Became an Attack Surface — And Most Teams Don't Know It Yet
- AI Agent Evaluation: Frameworks & Metrics for Production Systems
- LLM Engineering Part 3, From Basic LLM App to Production SaaS MVP
- Build Production-Ready LLM Agents
- LLM-Engineering; Building a Procurements Analyst AI
- One-File Procurement “AI Analyst” with LLM Engineering