Forem

Emanuele Balsamo profile picture

Emanuele Balsamo

Cybersecurity Specialist | Offensive Security Expert Focused on red teaming, offensive security, and proactive defense measures

Pronouns

He/Him

Work

Cyber Resilience Technical Director @ CodeBlue

Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026
Cover image for Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

Comments
7 min read
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights
Cover image for Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

Comments
6 min read
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It
Cover image for Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

Comments
7 min read
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team
Cover image for LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

Comments 1
7 min read
How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained
Cover image for How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

Comments
6 min read
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis
Cover image for Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

Comments
12 min read
Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses
Cover image for Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses

Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses

Comments
13 min read
Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself
Cover image for Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself

Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself

1
Comments
9 min read
Introducing Cyberpath Quant: The Next-Generation CVSS Calculator
Cover image for Introducing Cyberpath Quant: The Next-Generation CVSS Calculator

Introducing Cyberpath Quant: The Next-Generation CVSS Calculator

1
Comments
12 min read
Advanced Threat Hunting Techniques: Part 1
Cover image for Advanced Threat Hunting Techniques: Part 1

Advanced Threat Hunting Techniques: Part 1

Comments
8 min read
Advanced Threat Hunting Techniques: Part 2
Cover image for Advanced Threat Hunting Techniques: Part 2

Advanced Threat Hunting Techniques: Part 2

Comments
8 min read
APTs: Defense Strategies and Mitigation Techniques
Cover image for APTs: Defense Strategies and Mitigation Techniques

APTs: Defense Strategies and Mitigation Techniques

Comments
7 min read
APTs: Tactics, Techniques, and Procedures
Cover image for APTs: Tactics, Techniques, and Procedures

APTs: Tactics, Techniques, and Procedures

Comments
7 min read
Building a Secure Home Lab: A Complete Guide
Cover image for Building a Secure Home Lab: A Complete Guide

Building a Secure Home Lab: A Complete Guide

Comments
9 min read
CertDb: Building a Comprehensive Cybersecurity Certification Database
Cover image for CertDb: Building a Comprehensive Cybersecurity Certification Database

CertDb: Building a Comprehensive Cybersecurity Certification Database

Comments
9 min read
Deep Dive into Zero-Day Exploits: Part 1
Cover image for Deep Dive into Zero-Day Exploits: Part 1

Deep Dive into Zero-Day Exploits: Part 1

Comments
9 min read
Deep Dive into Zero-Day Exploits: Part 2
Cover image for Deep Dive into Zero-Day Exploits: Part 2

Deep Dive into Zero-Day Exploits: Part 2

Comments
9 min read
Designing Secure Plugin Architectures for Desktop Applications
Cover image for Designing Secure Plugin Architectures for Desktop Applications

Designing Secure Plugin Architectures for Desktop Applications

Comments
12 min read
Exploring RustiveDump. LSASS Dumping Using NTAPIs in Rust
Cover image for Exploring RustiveDump. LSASS Dumping Using NTAPIs in Rust

Exploring RustiveDump. LSASS Dumping Using NTAPIs in Rust

Comments
5 min read
Getting Started with Cybersecurity Certifications
Cover image for Getting Started with Cybersecurity Certifications

Getting Started with Cybersecurity Certifications

Comments
6 min read
How to Avoid Getting Lost in the Vast Cybersecurity Certification World
Cover image for How to Avoid Getting Lost in the Vast Cybersecurity Certification World

How to Avoid Getting Lost in the Vast Cybersecurity Certification World

Comments
5 min read
Mastering Burp Suite Bambdas: Unlocking Advanced Automation for the Web
Cover image for Mastering Burp Suite Bambdas: Unlocking Advanced Automation for the Web

Mastering Burp Suite Bambdas: Unlocking Advanced Automation for the Web

Comments
5 min read
Orbis: Building a Modern Plugin-Driven Desktop Platform
Cover image for Orbis: Building a Modern Plugin-Driven Desktop Platform

Orbis: Building a Modern Plugin-Driven Desktop Platform

Comments
8 min read
PIC shellcode: The Rust Way
Cover image for PIC shellcode: The Rust Way

PIC shellcode: The Rust Way

Comments
15 min read
Understanding Red Team Operations: A Technical Deep Dive
Cover image for Understanding Red Team Operations: A Technical Deep Dive

Understanding Red Team Operations: A Technical Deep Dive

Comments
9 min read
Red Team vs. Blue Team: Strategies for Advanced Penetration Testing
Cover image for Red Team vs. Blue Team: Strategies for Advanced Penetration Testing

Red Team vs. Blue Team: Strategies for Advanced Penetration Testing

Comments
10 min read
Threat Intelligence Automation with AI/ML
Cover image for Threat Intelligence Automation with AI/ML

Threat Intelligence Automation with AI/ML

Comments
6 min read
Why You Should Build Your Own C2
Cover image for Why You Should Build Your Own C2

Why You Should Build Your Own C2

Comments
7 min read
Orbis: Building a Plugin-Driven Desktop Platform with Rust and React
Cover image for Orbis: Building a Plugin-Driven Desktop Platform with Rust and React

Orbis: Building a Plugin-Driven Desktop Platform with Rust and React

Comments
5 min read
loading...