- Does "XBOW AI Hacker" Deserve the Hype?
by utku1337 on 6/25/25, 4:21 PM, with comments
- Thoughts on How AI Will Shape Cyber Security
by utku1337 on 6/10/25, 5:24 PM, with comments
- Apple Intelligence denies rewriting a sentence that contain "protests in Turkey"
by utku1337 on 3/31/25, 9:01 PM, with comments
- Promptmap: A prompt injection scanner for LLM applications
by utku1337 on 1/22/25, 6:02 PM, with comments
- BaitRoute: A web honeypot library to create vulnerable-looking endpoints
by utku1337 on 1/14/25, 8:41 PM, with comments
- Making Small Mistakes Prevents Bigger Ones
by utku1337 on 1/9/25, 5:53 PM, with comments
- Spotting AI Cheaters in Remote Tech Interviews
by utku1337 on 11/4/24, 5:00 PM, with comments
- Can Engineers Stage a Coup and Take over Their Company?
by utku1337 on 7/22/24, 3:04 PM, with comments
- Evaluating the Impact of a Security Breach Using the "So What?" Technique
by utku1337 on 6/20/24, 4:03 PM, with comments
- The System Prompts of GPT-4o
by utku1337 on 5/16/24, 9:16 PM, with comments
- Spotify Should Implement a Donation Feature to Save Mid-Tier Musicians
by utku1337 on 4/25/24, 9:31 PM, with comments
- Security by Obscurity Is Underrated
by utku1337 on 9/8/20, 5:24 PM, with comments
- Jeopardize – low cost threat intelligence&response tool against phishing domains
by utku1337 on 3/11/20, 4:12 PM, with comments
- Torture-Proof Authentication
by utku1337 on 2/26/20, 5:40 PM, with comments
- An Introduction to Arcade Security
by utku1337 on 12/28/19, 12:01 PM, with comments
- Serving Django App Statically at the Lowest Cost Possible
by utku1337 on 11/2/19, 3:47 PM, with comments