Archive
Browse the full archive
For topic-based browsing, use the tags page.
A practical guide to using game theory in cybersecurity, from Nash and Stackelberg models to APT defense, forensic readiness, and LLM-driven simulations.
A practical framework for threat modeling autonomous AI agents in production, with concrete attack paths, controls, and measurable security SLOs.
software-engineering
Mar 2, 2026
Code review is a historical approval gate that simply no longer matches the shape of modern work. Here is why we need to pivot.
A technical comparison of classical ANN pipelines and transformer LLMs for vulnerability detection.
Stop Vibe coding: Why true engineers are now doing Vibe engineering
The world of AI is moving fast. Every day, we see amazing new tools like AutoGen and CrewAI that let us build teams of AI agents to get work done. These tools are powerful, but ...
Why do we suffer? A look at injustice without a God
In the shadows of the late 20th century, Ted Kaczynski, infamously known as the Unabomber, embarked on a nationwide bombing campaign that terrorized America for nearly two decad...
Introduction
Introduction
Are we just machines?
Last week I watched The Avengers: Infinity War again after 5 years and it sparked me why Thanos could be right.
In the rapidly evolving digital landscape, most companies are vying for supremacy based on their ability to deliver business value through software and technology. The speed and...
Advaita Vedanta, one of the philosophical schools of Hinduism, presents a profound vision of reality that challenges our everyday perceptions and encourages us to explore the de...
In the article “Man’s Greatest Achievement” published in the New York American on July 6, 1930, Nikola Tesla outlines his vision for the future of science and technology, specif...
“Thursday, October 31st. The city streets are crowded for the holiday. Even with the rain. Hidden in the chaos is the element, waiting to strike like snakes. And I’m there too. ...
The Sanskrit word akasha, translated as both “ether” and “space”, refers specifically to the vibratory element that is the subtlest in the material world, the “screen on which t...
Memory works (to put it simply) in 3 stages: attention, encoding (storing/associating with other info), and retrieval(remembering).
1. What is a Socratic Dialogue?
Introduction
Knowledge of x86 is important in security fields like malware analysis, vulnerability research and exploit development. The only prerequisite is to know the basics of C or C bas...
Types of memory exploit mitigation techniques