← Back to blog

Tag

AI

12 posts

·5 min read

How Cybersecurity Teams Actually Use AI: What I Told Students at PBSC

I spoke at Palm Beach State College's Cybersecurity Symposium on how security teams use AI in practice and what students can do right now to prepare.

·31 min read

Preliminary Findings: How Humans Detect AI-Generated Phishing Across 2,511 Classifications

Findings from 153 participants classifying AI-generated phishing: technique-level bypass rates, overconfidence patterns, and what security training misses.

·4 min read

Threat Terminal v2.0: PvP Is Here

Real-time 1v1 ranked matches, a new unlock ladder, and a terminal AI that will not stop talking. Threat Terminal v2.0 goes live tonight.

·6 min read

What's Coming in Threat Terminal v2

What is changing in Threat Terminal v2: complete UI overhaul, persistent progression, daily challenges, ranked PvP, badges, and a coin economy.

·8 min read

100 Participants: Preliminary Patterns Before the Real Analysis

Preliminary descriptive patterns from 100 participants and 1,612 classified emails in Threat Terminal, before formal statistical analysis begins.

·6 min read

Pilot Data: Which Phishing Techniques Actually Fool People?

Pilot data from 56 participants in Threat Terminal reveals which phishing techniques humans miss most when AI eliminates writing quality as a signal.

·5 min read

Fluent Prose: The Phishing Technique Security Training Ignores

Phishing emails with no urgency, no threats, and no red flags bypass humans at three times the rate of credential harvesting. Training has it backwards.

·6 min read

What Happens When AI Makes Every Phishing Email Perfect?

AI eliminated the grammar errors and broken formatting phishing training taught people to spot. The detection problem is now fundamentally different.

·6 min read

Building a Controlled Phishing Detection Dataset at Scale with the Claude API

How I built a controlled phishing dataset with the Claude API: batching by technique, automated review, and handling rate limits at scale.

·7 min read

Building Threat Terminal: What Actually Went Wrong

Decisions, pivots, and problems behind designing a phishing research study, and why the constraints produced a cleaner methodology than planned.

·7 min read

I'm Running a Phishing Research Study Inside a Retro Terminal Game

When AI eliminates grammar errors as a detection signal, the question becomes: which phishing techniques produce the biggest gaps in human detection?