Apr 2 · 6 min read · The hidden attack vectors in your server infrastructure Every server in your infrastructure is silently advertising potential entry points to attackers. Those clean, freshly deployed systems you're proud of? They're running services you never request...
Join discussion
Feb 26 · 8 min read · Every security audit starts the same way: "Show me all your public-facing assets." And every organization gives the same answer: a list that's incomplete. They know about www. They know about mail. They know about api. But what about dev.yourcompany....
Join discussion
Dec 26, 2025 · 7 min read · What 100 automated battles taught us about why prompt guardrails aren't enough I built an AI attacker. I gave it one job: break an HR chatbot's rules and get it to approve unauthorized leave. Then I let them fight — 100 times, completely unsupervise...
Join discussionNov 28, 2025 · 11 min read · Every year I tell myself the same lie. I whisper it like a mantra after a long night of breach reports and sleepless data pulls. I tell myself that the masses have finally learned, that the collective mind of the modern worker has evolved past the ol...
Join discussion
Nov 10, 2025 · 3 min read · Abstract During controlled validation of the Perim ASM Framework, our research team identified a high-impact configuration exposure within a third-party domain. This article outlines the discovery process, validation methodology, responsible disclosu...
Join discussion
Oct 9, 2025 · 7 min read · Artificial Intelligence (AI) chatbots, initially treated as mere customer support tools, have over time assumed central roles in enterprise processes. Just as chatbots help employees find information or assist customers in real time, they are also in...
Join discussion
Aug 28, 2025 · 4 min read · The attack surface of Large Language Models (LLMs) is a critical area of research, especially as these models become more integrated into various applications. To shed light on this, I conducted a series of tests on four prominent models: GPT-5, Gemi...
Join discussion
Apr 7, 2025 · 3 min read · 07/04/2025 The cyber threat landscape has undergone a dramatic transformation in recent years. What was once dominated by opportunistic attackers and simple malware campaigns has now evolved into a battlefield defined by nationstate operations, finan...
Join discussion