Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The MCP Attack Atlas — 40+ Ways to Attack an AI Agent (And How to Detect Them)

The MCP Attack Atlas — 40+ Ways to Attack an AI Agent (And How to Detect Them)

Comments 2
4 min read
Claude Code's Source Leaked. The Undercover Mode Should Worry You.

Claude Code's Source Leaked. The Undercover Mode Should Worry You.

Comments
4 min read
SaaS Pricing Models Decoded: What Per-Seat, Usage-Based, and Flat-Rate Really Cost You
Cover image for SaaS Pricing Models Decoded: What Per-Seat, Usage-Based, and Flat-Rate Really Cost You

SaaS Pricing Models Decoded: What Per-Seat, Usage-Based, and Flat-Rate Really Cost You

1
Comments
3 min read
V8's Official DevTools Fingerprint Patch Has Two Live Bypasses — Here's Why the Spec Is to Blame

V8's Official DevTools Fingerprint Patch Has Two Live Bypasses — Here's Why the Spec Is to Blame

Comments
5 min read
Two of Three: MolTrust Closes RSAC 2026's Open Agent Security Gaps

Two of Three: MolTrust Closes RSAC 2026's Open Agent Security Gaps

Comments
2 min read
🔐 AES-256 Finally Makes Sense (And It’s Way Simpler Than You Think)
Cover image for 🔐 AES-256 Finally Makes Sense (And It’s Way Simpler Than You Think)

🔐 AES-256 Finally Makes Sense (And It’s Way Simpler Than You Think)

Comments
2 min read
Evil Merge: The Git Attack That Hid Malware in Plain Sight for 3.5 Months
Cover image for Evil Merge: The Git Attack That Hid Malware in Plain Sight for 3.5 Months

Evil Merge: The Git Attack That Hid Malware in Plain Sight for 3.5 Months

Comments
6 min read
Adding human approval to LangChain tool calls in 12 lines of TypeScript

Adding human approval to LangChain tool calls in 12 lines of TypeScript

Comments
3 min read
Building a Zero Trust Security Architecture in Your Home Lab: A Practical Implementation Guide

Building a Zero Trust Security Architecture in Your Home Lab: A Practical Implementation Guide

Comments
10 min read
We Built the Governance Layer AI Agent Systems Need in Regulated Environments

We Built the Governance Layer AI Agent Systems Need in Regulated Environments

Comments
3 min read
API 개발자를 위한 NPM 의존성 보안 완벽 가이드: 공급망 보안 강화
Cover image for API 개발자를 위한 NPM 의존성 보안 완벽 가이드: 공급망 보안 강화

API 개발자를 위한 NPM 의존성 보안 완벽 가이드: 공급망 보안 강화

Comments
3 min read
Row-Level Security in Embedded Reporting: The Patterns That Actually Work for .NET SaaS

Row-Level Security in Embedded Reporting: The Patterns That Actually Work for .NET SaaS

Comments
2 min read
Home Lab Network Segmentation: A Practical Guide with VLANs, OPNsense and Proxmox

Home Lab Network Segmentation: A Practical Guide with VLANs, OPNsense and Proxmox

Comments
9 min read
SSL Certificate Expiry: The Silent Downtime Bomb
Cover image for SSL Certificate Expiry: The Silent Downtime Bomb

SSL Certificate Expiry: The Silent Downtime Bomb

Comments
3 min read
LLM Cost Tracking and Spend Management for Engineering Teams

LLM Cost Tracking and Spend Management for Engineering Teams

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.