
Cyber defence design, research & innovation.


Checking my devices for malware - Part 1 - OS X

Research Paper Dissection - LLM agents exploit 1day vulns

Using AI for real-time attack simulation at scale (part 3)

Detection with GenAI (Part 2): CrushFTP (CVE-2024-4040)

Research Paper Dissection - AI Token Inference Attacks

Getting the security basics right is hard, but it remains essential

AI Security - University of KZN MSc Lecture Series (part 1 of 4)

Detection with GenAI (Part 1): PaperCut (CVE-2023-27350)

Using AI for real-time attack simulation at scale (part 2)

Civitas talk on simplifying cybersecurity for startups

Using AI for real-time attack simulation at scale (part 1)
