Blog
Insights, tutorials, and thoughts on cybersecurity, certifications, and career development.
Categories
Tags
AI
AI Red Teaming
AI Security
AI security
Advanced Persistent Threats
Agentic AI
Autonomous Attacks
Data Poisoning
GDPR
LLM Security
LoRA Adapters
Model Backdoors
Model Poisoning
OWASP LLM01
Penetration Testing
Show moreShowing all 28 articles

E(
Emanuele (ebalo) BalsamoJan 17, 2026
Defensive Security
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis
Explore how deepfake technology has evolved into a potent cyber weapon, challenging traditional authentication methods. This article delves into detection techniques, defense strategies, and the implications for digital security in an era of synthetic media.
cybersecurity
deepfakes
+3
16 min read

E(
Emanuele (ebalo) BalsamoJan 17, 2026
Tools & Automation
Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses
Explore the emerging threats of adversarial machine learning, where attackers manipulate AI models to bypass security defenses. Learn about evasion, poisoning, and model extraction attacks, along with strategies to defend against these sophisticated threats.
cybersecurity
machine learning
+2
17 min read

E(
Emanuele (ebalo) BalsamoJan 17, 2026
Defensive Security
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights
Detailed forensic analysis of how AI model supply chains are being weaponized. Cover the expanding attack surface: contaminated training datasets, malicious model checkpoints, poisoned fine-tuning adapters, and compromised cloud infrastructure.
AI Security
Supply Chain Attacks
+3
7 min read

E(
Emanuele (ebalo) BalsamoJan 17, 2026
Defensive Security
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It
Comprehensive analysis of prompt injection vulnerabilities (OWASP LLM01) as the most critical AI security threat. Learn about direct and indirect injection techniques, real-world case studies, and defense strategies.
AI Security
Prompt Injection
+3
8 min read

E(
Emanuele (ebalo) BalsamoJan 17, 2026
Offensive Security
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team
Practical guide to red teaming Large Language Models as a security discipline distinct from traditional penetration testing. Learn how to build an internal red team to test your AI systems.
AI Security
Red Teaming
+3
8 min read

E(
Emanuele (ebalo) BalsamoJan 17, 2026
Defensive Security
How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained
Breaking down the Anthropic research showing that as few as 250 poisoned training samples can permanently compromise LLMs of any size. Understand data poisoning as the stealthiest attack vector that persists undetected through deployment and production use.
AI Security
Data Poisoning
+3
7 min read

E(
Emanuele (ebalo) BalsamoJan 17, 2026
Defensive Security
Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026
In-depth exploration of 2026's defining trend: autonomous AI agents fighting autonomous AI attackers. Understand the unprecedented security challenges created by agentic AI systems acting independently with minimal human oversight.
AI Security
Agentic AI
+3
9 min read

E(
Emanuele (ebalo) BalsamoJan 15, 2026
Tools & Automation
Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself
Discover how Sentinel's filesystem-backed architecture eliminates compliance theater, makes forensic evidence trivial, and turns your data into an immutable audit trail, no special tools required.
database
compliance
+4
10 min read

E(
Emanuele (ebalo) BalsamoJan 11, 2026
Security Research
Introducing Cyberpath Quant: The Next-Generation CVSS Calculator
Discover Cyberpath Quant: a modern, intuitive CVSS calculator that revolutionizes vulnerability severity assessment.
cvss
vulnerability assessment
+3
14 min read
...








