{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Aidan John","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/aidanj","_microblog":{"about":"https://micro.blog/about/api","id":"1789763","username":"aidanj","bio":"Aspiring security professional. Documenting my journey to competency. All views are my own and subject to change.","pronouns":"he/him","is_following":false,"is_you":false,"following_count":1,"discover_count":0},"author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://avatars.micro.blog/avatars/2025/23/1789763.jpg"},"items":[{"id":"76363464","content_html":"<p>Modern Context Engineering: <a href=\"https://blog.aidanjohn.org/2025/10/22/modern-context-engineering.html\">blog.aidanjohn.org</a></p>","summary":"","url":"https://blog.aidanjohn.org/2025/10/22/modern-context-engineering.html","date_published":"2025-10-22T13:00:44+00:00","author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F23%2F1789763.jpg","_microblog":{"username":"aidanj"}},"_microblog":{"date_relative":"2025-10-22 13:00","date_timestamp":1761138044,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"74495582","content_html":"<p>XBOW - Agentic Pentesting with ZERO False Positives: <a href=\"https://blog.aidanjohn.org/2025/09/27/xbow-agentic-pentesting-with-zero.html\">blog.aidanjohn.org</a></p>","summary":"","url":"https://blog.aidanjohn.org/2025/09/27/xbow-agentic-pentesting-with-zero.html","date_published":"2025-09-27T19:39:25+00:00","author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F23%2F1789763.jpg","_microblog":{"username":"aidanj"}},"_microblog":{"date_relative":"2025-09-27 19:39","date_timestamp":1759001965,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"72452729","content_html":"<p>Proactive Cyber Defense with KillChainGraph: <a href=\"https://blog.aidanjohn.org/2025/08/31/proactive-cyber-defense-with-killchaingraph.html\">blog.aidanjohn.org</a></p>","summary":"","url":"https://blog.aidanjohn.org/2025/08/31/proactive-cyber-defense-with-killchaingraph.html","date_published":"2025-08-31T16:02:58+00:00","author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F23%2F1789763.jpg","_microblog":{"username":"aidanj"}},"_microblog":{"date_relative":"2025-08-31 16:02","date_timestamp":1756656178,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"70302828","content_html":"<p>Bypassing LLM Safeguards with CognitiveAttack: <a href=\"https://blog.aidanjohn.org/2025/08/01/bypassing-llm-safeguards-with-cognitiveattack.html\">blog.aidanjohn.org</a></p>","summary":"Leveraging cognitive bias to bypass LLM safeguards.","url":"https://blog.aidanjohn.org/2025/08/01/bypassing-llm-safeguards-with-cognitiveattack.html","date_published":"2025-08-01T15:17:52+00:00","author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F23%2F1789763.jpg","_microblog":{"username":"aidanj"}},"_microblog":{"date_relative":"2025-08-01 15:17","date_timestamp":1754061472,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"70127928","content_html":"<p>MCP - A New Frontier in GenAI Security: <a href=\"https://blog.aidanjohn.org/2025/07/30/mcp-a-new-frontier-in.html\">blog.aidanjohn.org</a></p>","summary":"","url":"https://blog.aidanjohn.org/2025/07/30/mcp-a-new-frontier-in.html","date_published":"2025-07-30T11:18:48+00:00","author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F23%2F1789763.jpg","_microblog":{"username":"aidanj"}},"_microblog":{"date_relative":"2025-07-30 11:18","date_timestamp":1753874328,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"68430646","content_html":"<p>sRAG - Exploring Secure RAG: <a href=\"https://blog.aidanjohn.org/2025/07/07/srag-exploring-secure-rag.html\">blog.aidanjohn.org</a></p>","summary":"","url":"https://blog.aidanjohn.org/2025/07/07/srag-exploring-secure-rag.html","date_published":"2025-07-07T21:44:36+00:00","author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F23%2F1789763.jpg","_microblog":{"username":"aidanj"}},"_microblog":{"date_relative":"2025-07-07 21:44","date_timestamp":1751924676,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"66893809","content_html":"<p>HTB - Appointment (SQL Injection): <a href=\"https://blog.aidanjohn.org/2025/06/16/htb-appointment-sql-injection.html\">blog.aidanjohn.org</a></p>","summary":"This blog series will explore HackTheBox starting point challenges, beginning with a SQL injection vulnerability in the &ldquo;Appointment&rdquo; box.","url":"https://blog.aidanjohn.org/2025/06/16/htb-appointment-sql-injection.html","date_published":"2025-06-16T14:17:15+00:00","author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F23%2F1789763.jpg","_microblog":{"username":"aidanj"}},"_microblog":{"date_relative":"2025-06-16 14:17","date_timestamp":1750083435,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"66890745","content_html":"<p>Test post with Quill</p>\n","summary":"","url":"https://blog.aidanjohn.org/2025/06/16/test-post-with-quill.html","date_published":"2025-06-16T13:27:58+00:00","author":{"name":"Aidan John","url":"https://blog.aidanjohn.org/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F23%2F1789763.jpg","_microblog":{"username":"aidanj"}},"_microblog":{"date_relative":"2025-06-16 13:27","date_timestamp":1750080478,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}}]}