HMMNM
Initializing
Skip to content
Hmmnm
  • Home
  • Blog
  • Security

      Latest in Security

    • Read more about the article Red Teaming LLM Applications: A Practical Playbook (2026)

      Red Teaming LLM Applications: A Practical Playbook (2026)

      April 6, 2026
    • Read more about the article Post-Quantum Cryptography for Cyber Professionals

      Post-Quantum Cryptography for Cyber Professionals

      April 1, 2026
    • Read more about the article Crypto Agility After PQC: How to Avoid the Next Migration Failure

      Crypto Agility After PQC: How to Avoid the Next Migration Failure

      March 28, 2026
  • Travel

      Latest in Travel

    • Read more about the article Rishikesh Travel Guide: The Yoga Capital of the World

      Rishikesh Travel Guide: The Yoga Capital of the World

      May 28, 2023
    • Read more about the article Cherrapunji: India’s Pristine Paradise

      Cherrapunji: India’s Pristine Paradise

      October 2, 2022
    • Read more about the article Kartarpur Sahib Travel Guide: The End to a 72-Year Wait

      Kartarpur Sahib Travel Guide: The End to a 72-Year Wait

      January 15, 2020
  • Food

      Latest in Food

    • Read more about the article The Ultimate Guide to Chole: Regional Variations, Nutrition, and Global Journey

      The Ultimate Guide to Chole: Regional Variations, Nutrition, and Global Journey

      March 15, 2025
  • Experience

      Latest in Experience

    • Read more about the article AI and Mental Health: Technology Meets Human Healing

      AI and Mental Health: Technology Meets Human Healing

      April 1, 2026
    • Read more about the article Kashmir Part 2: The Proxy War, Propaganda, and the Path Ahead

      Kashmir Part 2: The Proxy War, Propaganda, and the Path Ahead

      July 20, 2019
    • Read more about the article Kashmir Part 1: The Mirage of Peace and Prosperity

      Kashmir Part 1: The Mirage of Peace and Prosperity

      July 20, 2019
    • Read more about the article Blood Donation: Benefits, Risks, and Evidence

      Blood Donation: Benefits, Risks, and Evidence

      January 15, 2019
  • About
  • Contact
  • Toggle website search
Menu Close
  • Home
  • Blog
  • Security
  • Travel
  • Food
  • Experience
  • About
  • Contact
  • Toggle website search

Monthly Archives: February 2026

  1. Home>
  2. 2026>
  3. February
Read more about the article Agentic AI Security: Attack Surface in Autonomous Systems
Agentic AI Security: Attack Surface in Autonomous Systems

Agentic AI Security: Attack Surface in Autonomous Systems

  • Post author:Prabhu Kalyan Samal
  • Post published:February 26, 2026
  • Post category:Security

A practical guide to agentic AI security covering goal hijacking, tool misuse, identity and privilege abuse, memory poisoning, multi-agent trust issues, and defense frameworks for autonomous AI systems.

Continue ReadingAgentic AI Security: Attack Surface in Autonomous Systems
Read more about the article 100 Network Topics to Revise Before Your Interview
Network Revision Before an Interview

100 Network Topics to Revise Before Your Interview

  • Post author:Prabhu Kalyan Samal
  • Post published:February 23, 2026
  • Post category:Security

100 essential networking topics to revise before your technical interview. Covers OSI model, TCP/IP fundamentals, routing protocols, switching concepts, security basics, and troubleshooting methodologies.

Continue Reading100 Network Topics to Revise Before Your Interview
Read more about the article Securing AI Agents in the Enterprise SOC

Securing AI Agents in the Enterprise SOC

  • Post author:
  • Post published:February 22, 2026
  • Post category:Security

How AI agents transform enterprise SOC operations — autonomous triage, incident response, threat hunting, and compliance automation.

Continue ReadingSecuring AI Agents in the Enterprise SOC
Read more about the article How I Mastered XSS: A Complete Tutorial
How I Mastered XSS: A Complete Tutorial

How I Mastered XSS: A Complete Tutorial

  • Post author:Prabhu Kalyan Samal
  • Post published:February 19, 2026
  • Post category:Security

Complete cross-site scripting (XSS) tutorial covering stored, reflected, and DOM-based XSS with practical exploitation examples and prevention strategies including CSP.

Continue ReadingHow I Mastered XSS: A Complete Tutorial
Read more about the article Deep Dive into Server-Side Template Injection (SSTI)
Deep Dive into Server-Side Template Injection (SSTI)

Deep Dive into Server-Side Template Injection (SSTI)

  • Post author:Prabhu Kalyan Samal
  • Post published:February 12, 2026
  • Post category:Security

Deep dive into Server-Side Template Injection (SSTI) vulnerabilities. Learn how template engines can be exploited, detection techniques across Jinja2, Twig, and other engines, and remediation strategies.

Continue ReadingDeep Dive into Server-Side Template Injection (SSTI)
Read more about the article 10 Essential Tips for Aspiring Ethical Hackers
10 Essential Tips for Aspiring Ethical Hackers

10 Essential Tips for Aspiring Ethical Hackers

  • Post author:Prabhu Kalyan Samal
  • Post published:February 9, 2026
  • Post category:Security

10 essential tips for aspiring ethical hackers. Build your cybersecurity career with practical advice on certifications, tool proficiency, lab environments, bug bounty programs, and continuous learning strategies.

Continue Reading10 Essential Tips for Aspiring Ethical Hackers
Read more about the article How to Attack and Mitigate Request Smuggling in Depth
Learn: How to Attack and Mitigate Request Smuggling in-depth

How to Attack and Mitigate Request Smuggling in Depth

  • Post author:Prabhu Kalyan Samal
  • Post published:February 5, 2026
  • Post category:Security

In-depth guide to HTTP request smuggling attacks. Learn how to exploit discrepancies between frontend proxies and backend servers in both HTTP/1.1 and HTTP/2 environments with practical examples.

Continue ReadingHow to Attack and Mitigate Request Smuggling in Depth
Read more about the article Ransomware Evolution 2016-2026: What Defenders Keep Missing
Ransomware Evolution 2016-2026: What Defenders Keep Missing

Ransomware Evolution 2016-2026: What Defenders Keep Missing

  • Post author:Prabhu Kalyan Samal
  • Post published:February 2, 2026
  • Post category:Security

A decade analysis of ransomware evolution from 2016 to 2026, covering RaaS operations, double extortion, initial access brokers, living off the land techniques, and what defenders keep missing.

Continue ReadingRansomware Evolution 2016-2026: What Defenders Keep Missing

Categories

  • Experience (4)
  • Food (1)
  • Security (31)
  • Technology (4)
  • Travel (3)

Recent Posts

  • AI Agent Security: Why Your Autonomous Systems Are the New Attack Surface
  • Red Teaming LLM Applications: A Practical Playbook (2026)
  • TurboQuant Explained: Google AI Memory Breakthrough
  • AI and Mental Health: Technology Meets Human Healing
  • Post-Quantum Cryptography for Cyber Professionals
  • Zero Trust Architecture for AI Systems: Implementation Guide
  • Crypto Agility After PQC: How to Avoid the Next Migration Failure
  • AI Supply Chain Attacks: When Your AI Model Becomes the Backdoor
  • What Is MCP (Model Context Protocol)?
  • Software Supply Chain Security: Risks in Dependencies, Builds, and Secrets
  • Prompt Injection in 2026: Real Attacks & Defense Strategies
  • SSH to VPS Security Pentesting: Scenarios, Tools & Hardening
  • Identity Security: Modern Attacks on Users, Sessions & Trust
  • AI Model Extraction and Distillation Attacks: How Your Model Gets Stolen
  • OWASP Top 10 for Agentic Applications 2026: Complete Security Guide

Archives

  • May 2026 (1)
  • April 2026 (4)
  • March 2026 (12)
  • February 2026 (8)
  • January 2026 (5)
  • December 2025 (1)
  • November 2025 (1)
  • October 2025 (1)
  • August 2025 (1)
  • March 2025 (1)
  • January 2025 (1)
  • June 2023 (1)
  • May 2023 (1)
  • October 2022 (1)
  • January 2020 (1)
  • July 2019 (2)
  • January 2019 (1)

Newsletter

Get all latest content delivered to your email a few times a month. Updates and news about all categories will send to you.
Email is required Email is not valid
This field is required
Thanks for your subscription.
Failed to subscribe, please contact admin.
Hmmnm

Our Other Sites

  • Hmmnm.in
  • Odia.hmmnm.in

Quick Links

  • About Me
  • Contact
  • Blog
  • Privacy Policy
  • Disclaimer

Contact Info

  • 📧 contact@hmmnm.com
  • 🌐 hmmnm.com
𝕏⌨in✉
© 2026 @Hmmnm

We use cookies to enhance your experience. By continuing to visit this site, you agree to our use of cookies. Privacy Policy

🍪 We use cookies to enhance your experience. By continuing, you agree to our Privacy Policy.
  • Home
  • Blog
  • Security
  • Travel
  • Food
  • Experience
  • About
  • Contact
This site uses AI tools for content enhancement. No personal data is sent to AI services. Learn more