PinnedJustin Narine-RamsepaulThe OWASP Large Language Model Applications Top 10: A Deep DiveLLM Security: A deep dive into the OWASP Large Language Model Top 104 min read·Nov 11, 2023----
PinnedJustin Narine-RamsepaulDeception for Detection - Catching the Intruder’s Hand in the HoneyPotThe Apiary Framework aims to provide a structured approach to the deployment and management of honeypots on a network.8 min read·Aug 11, 2022----
Justin Narine-RamsepaulBackup and Recovery Solutions: An underrated attack surfaceLearn why threat actors target Backup and Recovery Solutions and how to secure them from attacks.4 min read·Apr 30, 2024----
Justin Narine-RamsepaulWhy is my Outlook account named “ADMIN SERVICE”?A story of a threat actor group from Nigeria and the compromise of an Outlook account7 min read·Apr 24, 2021----