Forem

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The New Wave of Accessibility-Service Malware Explained
Cover image for The New Wave of Accessibility-Service Malware Explained

The New Wave of Accessibility-Service Malware Explained

1
Comments 1
1 min read
Why Device Binding Fails — And How Attackers Bypass It
Cover image for Why Device Binding Fails — And How Attackers Bypass It

Why Device Binding Fails — And How Attackers Bypass It

Comments
1 min read
NomShub: How to Check If Your Mac Was Affected by the Cursor Sandbox Escape

NomShub: How to Check If Your Mac Was Affected by the Cursor Sandbox Escape

Comments
5 min read
A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)
Cover image for A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

Comments
7 min read
Beyond the Chatbot: How Claude Code Is Turning Security Audits Into a One-Command Workflow
Cover image for Beyond the Chatbot: How Claude Code Is Turning Security Audits Into a One-Command Workflow

Beyond the Chatbot: How Claude Code Is Turning Security Audits Into a One-Command Workflow

Comments
4 min read
Why I built attack-chain correlation on top of Semgrep and Joern
Cover image for Why I built attack-chain correlation on top of Semgrep and Joern

Why I built attack-chain correlation on top of Semgrep and Joern

Comments
3 min read
LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure
Cover image for LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure

LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure

1
Comments
12 min read
Automated Security Audits With AI Agent Teams

Automated Security Audits With AI Agent Teams

Comments
2 min read
EU Cyber Resilience Act: What It Means for Your Codebase and How to Prepare

EU Cyber Resilience Act: What It Means for Your Codebase and How to Prepare

Comments
3 min read
Awareness, Not Safety Net: Set Correct Expectations
Cover image for Awareness, Not Safety Net: Set Correct Expectations

Awareness, Not Safety Net: Set Correct Expectations

Comments
2 min read
Why CodeGate Exists: Inspect Before Trust
Cover image for Why CodeGate Exists: Inspect Before Trust

Why CodeGate Exists: Inspect Before Trust

Comments
3 min read
Introducing FOSRES: A Free and Open Source Security Research Project

Introducing FOSRES: A Free and Open Source Security Research Project

Comments
4 min read
The Cornucopia of Gamified Threat Modeling
Cover image for The Cornucopia of Gamified Threat Modeling

The Cornucopia of Gamified Threat Modeling

3
Comments 2
7 min read
Week 11: Audit 7 Full-Stack Security Audit Challenges: Can You Find All the Bugs?

Week 11: Audit 7 Full-Stack Security Audit Challenges: Can You Find All the Bugs?

Comments
23 min read
Week 10: Security Engineering Phone Screen: 10 Questions You Must Answer Fluently

Week 10: Security Engineering Phone Screen: 10 Questions You Must Answer Fluently

1
Comments
12 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.