Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Passkey Revolution: Why 2025 Is the Year Passwords Finally Die

The Passkey Revolution: Why 2025 Is the Year Passwords Finally Die

1
Comments
2 min read
What Is SIEM? Understanding Its Role in the Modern Cybersecurity Ecosystem

What Is SIEM? Understanding Its Role in the Modern Cybersecurity Ecosystem

Comments
3 min read
ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware
Cover image for ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

Comments
5 min read
The Art Of System Awareness: Reading Signals With Code

The Art Of System Awareness: Reading Signals With Code

Comments
8 min read
CRITICAL Next.js Security Alert: Patch 'React2Shell' RCE Now

CRITICAL Next.js Security Alert: Patch 'React2Shell' RCE Now

Comments
2 min read
Excessive Agency in Agentic AI: Setting Safe Boundaries
Cover image for Excessive Agency in Agentic AI: Setting Safe Boundaries

Excessive Agency in Agentic AI: Setting Safe Boundaries

Comments
9 min read
Security news weekly round-up - 28th November 2025
Cover image for Security news weekly round-up - 28th November 2025

Security news weekly round-up - 28th November 2025

1
Comments
3 min read
Shadow Routes: Threading Yourself Through The Cracks In A City
Cover image for Shadow Routes: Threading Yourself Through The Cracks In A City

Shadow Routes: Threading Yourself Through The Cracks In A City

Comments
7 min read
I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)
Cover image for I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)

I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)

1
Comments 2
5 min read
How to Evaluate Smart Device + Token Projects: A Checklist for Crypto Investors & Builders

How to Evaluate Smart Device + Token Projects: A Checklist for Crypto Investors & Builders

Comments
2 min read
70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.
Cover image for 70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

Comments
1 min read
Limiting Public Access and Protecting Sensitive Data in Azure Storage
Cover image for Limiting Public Access and Protecting Sensitive Data in Azure Storage

Limiting Public Access and Protecting Sensitive Data in Azure Storage

Comments
3 min read
Modernizing Telecom Security ML Powered Approach

Modernizing Telecom Security ML Powered Approach

Comments
5 min read
Beyond Filters: Rearchitecting Prompt Injection Defense
Cover image for Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

2
Comments
4 min read
48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production
Cover image for 48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

Comments
1 min read
Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Comments
2 min read
What is Networking? A Hacker’s Guide to Understanding the Web of Connections
Cover image for What is Networking? A Hacker’s Guide to Understanding the Web of Connections

What is Networking? A Hacker’s Guide to Understanding the Web of Connections

Comments
4 min read
Build Your Own AIDE Automation - Guide

Build Your Own AIDE Automation - Guide

1
Comments
3 min read
AWS Security Fundamentals with AWS BuilderCards Security Expansion Pack

AWS Security Fundamentals with AWS BuilderCards Security Expansion Pack

Comments
10 min read
Encrypting Secrets in Production (Without Breaking Everything)

Encrypting Secrets in Production (Without Breaking Everything)

Comments
4 min read
Building a DevSecOps Pipeline on AWS: From Security Audit to Daily Deployments

Building a DevSecOps Pipeline on AWS: From Security Audit to Daily Deployments

Comments
15 min read
Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)
Cover image for Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)

Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)

2
Comments 5
6 min read
WIP student project: multi-account AWS “Secure Data Hub” (would love feedback!)

WIP student project: multi-account AWS “Secure Data Hub” (would love feedback!)

1
Comments
1 min read
Deploying TEAM and Building the Best Engineering Team

Deploying TEAM and Building the Best Engineering Team

Comments
3 min read
loading...