Why I Hate Anthropic and You Should Too
All the best influencers hate Anthropic right now, and for good reason. They ruined everything, and they’re worthy of every bit of hate they get.…
All the best influencers hate Anthropic right now, and for good reason. They ruined everything, and they’re worthy of every bit of hate they get.…
I have a new concept I’m using everywhere in my AI engineering called Bitter-Pilled Engineering (BPE). The idea comes from Richard Sutton’s essay, “The Bitter…
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: How a read-only Kubernetes permission turned into full cluster takeover AI agent…
Three things you need to thrive in a world that keeps changing February 19, 2026 I just thought of a simple framework for becoming anti-fragile…
I’m a fan of Truffle and Eduard’s research, they’ve been featured a lot in tl;dr sec. This should be a practical, useful webinar Mercari’s…
Report writing is an integral part of bug bounty or any type of vulnerability assessment. In fact, sometimes, it can become the most important phase.…
API security has been a growing concern for years. However, while it was always seen as important, it often came second to application security or…
What you will learn in this blog What chaining is and how combining lower-severity issues can create a high-impact security risk. Key chaining techniques and…
All the labs are using a combination of pre-training and RL to create better “general” models. Which means they’re not just good at one thing…
AI for Security Engineers (with Cursor’s Security Lead) AI is helping developers ship faster than ever. How can security keep up? I’m stoked for my…
Most people don’t think about spinner text. It’s that little “Thinking…” or “Processing…” that ticks by while Claude Code works. Background noise. Furniture. Daniel went…
By now, you may have Anthropic’s zero-days blogpost where an “out-of-the-box” Claude Opus 4.6 workflow was used to find 500 vulnerabilities in open-source projects. While…