Jan 2026
AI / LLM
MCP Under Attack: A Complete Security Breakdown
A deep dive into Model Context Protocol — attack surfaces it exposes and how security teams should approach MCP.
read article →
Nov 2025
Case Study
From Prompt to Pwn: How I Pen-Tested and Broke a LLM
Behind the scenes of a real LLM pentest — methodology, vulnerabilities found and key takeaways from a live client engagement.
read article →
Jun 2025
Detection
YARA Essentials: The Ultimate Guide to Rule-Based Detection
Crafting effective YARA rules — syntax deep dive and applying rule-based detection in real SOC environments.
read article →
Jun 2025
Threat Intel
Building Blocks of Defense: Key Frameworks for Threat Intelligence
Foundational frameworks powering modern threat intel — MITRE ATT&CK, Diamond Model and more.
read article →
Jun 2025
SOC
Beyond the Inbox: How a SOC Team Dissects Phishing Emails
How a SOC analyst systematically dissects and triages phishing email alerts — because APTs exploit humans first.
read article →
Oct 2024
API
API Hacking Deep Dive, Part 1: Your Starting Point in API Security
Reconnaissance, understanding API contracts, and identifying common vulnerabilities from the ground up.
read article →