Skip to content
Hmmnm
  • Home
  • Blog
  • Security

      Latest in Security

    • Read more about the article Supply Chain Security: Risks in Dependencies, Builds & Secrets

      Supply Chain Security: Risks in Dependencies, Builds & Secrets

      March 19, 2026
    • Read more about the article SSH to VPS Security Pentesting: Scenarios, Tools & Hardening

      SSH to VPS Security Pentesting: Scenarios, Tools & Hardening

      March 15, 2026
    • Read more about the article Identity Security: Modern Attacks on Users, Sessions & Trust

      Identity Security: Modern Attacks on Users, Sessions & Trust

      March 12, 2026
    • Read more about the article API Security: Authorization Flaws Behind Modern Breaches

      API Security: Authorization Flaws Behind Modern Breaches

      March 5, 2026
  • Travel

      Latest in Travel

    • Read more about the article Rishikesh: The Yoga Capital of the World

      Rishikesh: The Yoga Capital of the World

      May 28, 2023
    • Read more about the article Cherrapunji: Uncover India Pristine Paradise

      Cherrapunji: Uncover India Pristine Paradise

      October 2, 2022
  • Food

      Latest in Food

  • Experience

      Latest in Experience

  • About
  • Contact
  • Toggle website search
Menu Close
  • Home
  • Blog
  • Security
  • Travel
  • Food
  • Experience
  • About
  • Contact
  • Toggle website search

Monthly Archives: February 2026

  1. Home>
  2. 2026>
  3. February
Read more about the article Agentic AI Security: Attack Surface in Autonomous Systems

Agentic AI Security: Attack Surface in Autonomous Systems

  • Post author:Prabhu Kalyan Samal
  • Post published:February 26, 2026
  • Post category:Security

A practical guide to agentic AI security covering goal hijacking, tool misuse, identity and privilege abuse, memory poisoning, multi-agent trust issues, and defense frameworks for autonomous AI systems.

Continue ReadingAgentic AI Security: Attack Surface in Autonomous Systems
Read more about the article 100 Network Topics to Revise Before Your Interview
Network Revision Before an Interview

100 Network Topics to Revise Before Your Interview

  • Post author:Prabhu Kalyan Samal
  • Post published:February 23, 2026
  • Post category:Security

100 essential networking topics to revise before your technical interview. Covers OSI model, TCP/IP fundamentals, routing protocols, switching concepts, security basics, and troubleshooting methodologies.

Continue Reading100 Network Topics to Revise Before Your Interview
Read more about the article How I Mastered XSS: A Complete Tutorial

How I Mastered XSS: A Complete Tutorial

  • Post author:Prabhu Kalyan Samal
  • Post published:February 19, 2026
  • Post category:Security

Complete cross-site scripting (XSS) tutorial covering stored, reflected, and DOM-based XSS with practical exploitation examples and prevention strategies including CSP.

Continue ReadingHow I Mastered XSS: A Complete Tutorial
Read more about the article Deep Dive into Server-Side Template Injection (SSTI)
SSTI Server Side Template Injection

Deep Dive into Server-Side Template Injection (SSTI)

  • Post author:Prabhu Kalyan Samal
  • Post published:February 12, 2026
  • Post category:Security

Deep dive into Server-Side Template Injection (SSTI) vulnerabilities. Learn how template engines can be exploited, detection techniques across Jinja2, Twig, and other engines, and remediation strategies.

Continue ReadingDeep Dive into Server-Side Template Injection (SSTI)
Read more about the article 10 Essential Tips for Aspiring Ethical Hackers
Ethical Hacker Tips

10 Essential Tips for Aspiring Ethical Hackers

  • Post author:Prabhu Kalyan Samal
  • Post published:February 9, 2026
  • Post category:Security

10 essential tips for aspiring ethical hackers. Build your cybersecurity career with practical advice on certifications, tool proficiency, lab environments, bug bounty programs, and continuous learning strategies.

Continue Reading10 Essential Tips for Aspiring Ethical Hackers
Read more about the article Learn: How to Attack and Mitigate Request Smuggling in-depth
Request Smuggling

Learn: How to Attack and Mitigate Request Smuggling in-depth

  • Post author:Prabhu Kalyan Samal
  • Post published:February 5, 2026
  • Post category:Security

In-depth guide to HTTP request smuggling attacks. Learn how to exploit discrepancies between frontend proxies and backend servers in both HTTP/1.1 and HTTP/2 environments with practical examples.

Continue ReadingLearn: How to Attack and Mitigate Request Smuggling in-depth
Read more about the article Ransomware Evolution 2016-2026: What Defenders Keep Missing

Ransomware Evolution 2016-2026: What Defenders Keep Missing

  • Post author:Prabhu Kalyan Samal
  • Post published:February 2, 2026
  • Post category:Security

A decade analysis of ransomware evolution from 2016 to 2026, covering RaaS operations, double extortion, initial access brokers, living off the land techniques, and what defenders keep missing.

Continue ReadingRansomware Evolution 2016-2026: What Defenders Keep Missing

Categories

  • Experience (2)
  • Security (17)
  • Technology (2)
  • Travel (3)

Recent Posts

  • WHAT is MCP (Model Context Protocol)
  • Supply Chain Security: Risks in Dependencies, Builds & Secrets
  • SSH to VPS Security Pentesting: Scenarios, Tools & Hardening
  • Identity Security: Modern Attacks on Users, Sessions & Trust
  • API Security: Authorization Flaws Behind Modern Breaches
  • Ensuring Robust Security in Login and Registration Systems
  • Agentic AI Security: Attack Surface in Autonomous Systems
  • 100 Network Topics to Revise Before Your Interview
  • How I Mastered XSS: A Complete Tutorial
  • Deep Dive into Server-Side Template Injection (SSTI)
  • 10 Essential Tips for Aspiring Ethical Hackers
  • Learn: How to Attack and Mitigate Request Smuggling in-depth
  • Ransomware Evolution 2016-2026: What Defenders Keep Missing
  • Error-Based Exploitation: Techniques & Mitigation
  • XXE Injection: Discovery to Exploitation Guide

Archives

  • March 2026 (6)
  • February 2026 (7)
  • January 2026 (4)
  • August 2025 (1)
  • June 2023 (1)
  • May 2023 (1)
  • October 2022 (1)
  • January 2020 (1)
  • April 2016 (2)

Newsletter

Get all latest content delivered to your email a few times a month. Updates and news about all categories will send to you.
Email is required Email is not valid
This field is required
Thanks for your subscription.
Failed to subscribe, please contact admin.

Hmmnm!!

Footer Logo

Subscribe to our Newsletter

Loading

Our Other Sites

  • Hmmnm.in
  • Odia.hmmnm.in

Quick Links

  • About Me
  • Contact
  • Blog
  • Privacy Policy
  • Disclaimer

Contact Info

  • 📧 contact@hmmnm.com
  • 🌐 hmmnm.com
🛡️

"Security is not a product, but a process."

— Bruce Schneier

© 2026 @Hmmnm
AI
Hmmnm AI Online — ready to help
Hi! I am Hmmnm AI. Ask me about cybersecurity, ethical hacking, or tech topics.
9:21 AM
Powered by Hmmnm.AI