Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Cyberpath Blog Series' Articles
Back to Emanuele Balsamo's Series
Why You Should Build Your Own C2
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Why You Should Build Your Own C2
#
redteam
#
c2
#
softwaredevelopment
#
cobaltstrike
Comments
Add Comment
7 min read
Threat Intelligence Automation with AI/ML
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Threat Intelligence Automation with AI/ML
#
ai
#
machinelearning
#
threatintelligence
Comments
Add Comment
6 min read
Red Team vs. Blue Team: Strategies for Advanced Penetration Testing
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Red Team vs. Blue Team: Strategies for Advanced Penetration Testing
#
redteam
#
blueteam
#
overview
#
analysis
Comments
Add Comment
10 min read
Understanding Red Team Operations: A Technical Deep Dive
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Understanding Red Team Operations: A Technical Deep Dive
#
redteam
#
penetrationtesting
#
offensivesecurity
#
advanced
Comments
Add Comment
9 min read
PIC shellcode: The Rust Way
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
PIC shellcode: The Rust Way
#
shellcode
#
rust
#
offensivesecurity
#
redteam
Comments
Add Comment
15 min read
Orbis: Building a Modern Plugin-Driven Desktop Platform
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Orbis: Building a Modern Plugin-Driven Desktop Platform
#
rust
#
react
#
desktop
#
architecture
Comments
Add Comment
8 min read
Mastering Burp Suite Bambdas: Unlocking Advanced Automation for the Web
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Mastering Burp Suite Bambdas: Unlocking Advanced Automation for the Web
#
burpsuite
#
penetrationtesting
#
scripting
#
automation
Comments
Add Comment
5 min read
How to Avoid Getting Lost in the Vast Cybersecurity Certification World
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
How to Avoid Getting Lost in the Vast Cybersecurity Certification World
#
certification
#
career
#
careergrowth
#
cybersecuritycertifications
Comments
Add Comment
5 min read
Getting Started with Cybersecurity Certifications
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Getting Started with Cybersecurity Certifications
#
certifications
#
career
#
beginners
Comments
Add Comment
6 min read
Exploring RustiveDump. LSASS Dumping Using NTAPIs in Rust
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Exploring RustiveDump. LSASS Dumping Using NTAPIs in Rust
#
rust
#
offensivesecurity
#
dumps
#
lsass
Comments
Add Comment
5 min read
Designing Secure Plugin Architectures for Desktop Applications
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Designing Secure Plugin Architectures for Desktop Applications
#
architecture
#
plugins
#
security
#
development
Comments
Add Comment
12 min read
Deep Dive into Zero-Day Exploits: Part 2
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Deep Dive into Zero-Day Exploits: Part 2
#
zeroday
#
blueteam
#
defense
#
mitigationstrategies
Comments
Add Comment
9 min read
Deep Dive into Zero-Day Exploits: Part 1
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Deep Dive into Zero-Day Exploits: Part 1
#
zeroday
#
exploit
#
development
#
vulnerability
Comments
Add Comment
9 min read
CertDb: Building a Comprehensive Cybersecurity Certification Database
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
CertDb: Building a Comprehensive Cybersecurity Certification Database
#
database
#
certifications
#
community
Comments
Add Comment
9 min read
Building a Secure Home Lab: A Complete Guide
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Building a Secure Home Lab: A Complete Guide
#
homelab
#
learning
#
virtualization
#
practice
Comments
Add Comment
9 min read
APTs: Tactics, Techniques, and Procedures
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
APTs: Tactics, Techniques, and Procedures
#
defense
#
apt
#
casestudy
#
tactics
Comments
Add Comment
7 min read
APTs: Defense Strategies and Mitigation Techniques
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
APTs: Defense Strategies and Mitigation Techniques
#
defense
#
mitigationtechniques
#
apt
#
defensestrategies
Comments
Add Comment
7 min read
Advanced Threat Hunting Techniques: Part 2
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Advanced Threat Hunting Techniques: Part 2
#
threathunting
#
mitreattack
#
threatintelligence
Comments
Add Comment
8 min read
Advanced Threat Hunting Techniques: Part 1
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Advanced Threat Hunting Techniques: Part 1
#
threathunting
#
anomalydetection
#
behavioralanalytics
#
threatintelligence
Comments
Add Comment
8 min read
Introducing Cyberpath Quant: The Next-Generation CVSS Calculator
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 11
Introducing Cyberpath Quant: The Next-Generation CVSS Calculator
#
vulnerabilities
#
security
#
cybersecurity
1
reaction
Comments
Add Comment
12 min read
Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 16
Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself
#
database
#
cybersecurity
#
dbms
#
rust
2
reactions
Comments
Add Comment
9 min read
Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 18
Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses
#
cybersecurity
#
machinelearning
#
ai
#
adventofai
Comments
Add Comment
13 min read
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 18
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis
#
cybersecurity
#
ai
#
deeplearning
#
aiops
1
reaction
Comments
Add Comment
12 min read
How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 18
How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained
#
cybersecurity
#
ai
#
aiops
#
machinelearning
1
reaction
Comments
Add Comment
6 min read
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 18
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team
#
ai
#
cybersecurity
#
llm
#
machinelearning
1
reaction
Comments
1
comment
7 min read
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 18
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It
#
cybersecurity
#
llm
#
ai
#
machinelearning
1
reaction
Comments
Add Comment
7 min read
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 18
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights
#
cybersecurity
#
ai
#
aiops
#
llm
1
reaction
Comments
Add Comment
6 min read
Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 18
Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026
#
ai
#
cybersecurity
#
llm
#
machinelearning
1
reaction
Comments
Add Comment
7 min read
How 10,000 API Queries Can Clone Your $3M AI Model
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 24
How 10,000 API Queries Can Clone Your $3M AI Model
#
ai
#
security
#
llm
#
tutorial
Comments
Add Comment
17 min read
How Stolen AI Models Can Compromise Your Entire Organization
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 24
How Stolen AI Models Can Compromise Your Entire Organization
#
ai
#
security
#
llm
#
deepsecurity
Comments
Add Comment
20 min read
The Ultimate Database That Makes Compliance Audits Effortless
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 29
The Ultimate Database That Makes Compliance Audits Effortless
#
database
#
rust
#
security
#
devops
Comments
Add Comment
6 min read
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account