Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Introducing Tunnel Whisperer: Surgical Connectivity for Networks That Say "No"
Cover image for Introducing Tunnel Whisperer: Surgical Connectivity for Networks That Say "No"

Introducing Tunnel Whisperer: Surgical Connectivity for Networks That Say "No"

5
Comments
6 min read
Healthcare AI and HIPAA: Every Clinical Note You Send to ChatGPT Is a Potential Violation

Healthcare AI and HIPAA: Every Clinical Note You Send to ChatGPT Is a Potential Violation

Comments
5 min read
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
Cover image for Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories

Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories

1
Comments
4 min read
I Built E2E Encrypted AI Proxying Using X25519 and SealedBox — Here's How

I Built E2E Encrypted AI Proxying Using X25519 and SealedBox — Here's How

1
Comments
6 min read
Building a Secure Django REST API from Scratch - DjangGuard
Cover image for Building a Secure Django REST API from Scratch - DjangGuard

Building a Secure Django REST API from Scratch - DjangGuard

Comments
6 min read
OpenClaw Joined OpenAI. Every Security Researcher Should Be Alarmed.

OpenClaw Joined OpenAI. Every Security Researcher Should Be Alarmed.

Comments
5 min read
I ran a privacy proxy on my AI traffic. Here's what it found.
Cover image for I ran a privacy proxy on my AI traffic. Here's what it found.

I ran a privacy proxy on my AI traffic. Here's what it found.

1
Comments
3 min read
The Superior way to share files over a LAN
Cover image for The Superior way to share files over a LAN

The Superior way to share files over a LAN

Comments
7 min read
I Built a Blockchain Voting System with RSA Encryption — Here's How It Works

I Built a Blockchain Voting System with RSA Encryption — Here's How It Works

Comments
4 min read
FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs
Cover image for FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs

FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs

Comments
5 min read
DOM XSS: Why Server-Side Sanitization Isn't Enough

DOM XSS: Why Server-Side Sanitization Isn't Enough

Comments
5 min read
I Built a Security Header Auditor in ~100 Lines of Node.js

I Built a Security Header Auditor in ~100 Lines of Node.js

Comments
6 min read
How to set up a passbolt server on Google Cloud

How to set up a passbolt server on Google Cloud

Comments
5 min read
I Built a Production-Ready Spring Boot Architecture (So You Don't Have To)
Cover image for I Built a Production-Ready Spring Boot Architecture (So You Don't Have To)

I Built a Production-Ready Spring Boot Architecture (So You Don't Have To)

Comments
4 min read
What I Found Scanning 30 Open-Source Repositories for CI/CD Identity Risks

What I Found Scanning 30 Open-Source Repositories for CI/CD Identity Risks

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.