Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Axios NPM Supply Chain Angriff: API Projekte schützen
Cover image for Axios NPM Supply Chain Angriff: API Projekte schützen

Axios NPM Supply Chain Angriff: API Projekte schützen

Comments
8 min read
Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)
Cover image for Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)

Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)

Comments
9 min read
วิธีรักษาความปลอดภัย NPM Dependencies คู่มือความปลอดภัยซัพพลายเชนสำหรับนักพัฒนา API
Cover image for วิธีรักษาความปลอดภัย NPM Dependencies คู่มือความปลอดภัยซัพพลายเชนสำหรับนักพัฒนา API

วิธีรักษาความปลอดภัย NPM Dependencies คู่มือความปลอดภัยซัพพลายเชนสำหรับนักพัฒนา API

Comments
5 min read
Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Comments
10 min read
Axios NPM サプライチェーン攻撃の仕組みとAPIプロジェクトの保護方法
Cover image for Axios NPM サプライチェーン攻撃の仕組みとAPIプロジェクトの保護方法

Axios NPM サプライチェーン攻撃の仕組みとAPIプロジェクトの保護方法

Comments
3 min read
What the Claude Code source leak reveals about how it actually works (and what to do with that)

What the Claude Code source leak reveals about how it actually works (and what to do with that)

Comments
4 min read
Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline
Cover image for Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline

Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline

Comments
3 min read
What Is ASN and How It Helps Security: A Beginner Guide

What Is ASN and How It Helps Security: A Beginner Guide

Comments
3 min read
Detecting Prompt Injection in LLM Apps (Python Library)

Detecting Prompt Injection in LLM Apps (Python Library)

Comments
1 min read
The Zero Privilege Paradigm: Definitive Guide to Immutable Security
Cover image for The Zero Privilege Paradigm: Definitive Guide to Immutable Security

The Zero Privilege Paradigm: Definitive Guide to Immutable Security

Comments
4 min read
Claude Code source map leaks are a wake-up call — here's how to monitor agent vulnerabilities

Claude Code source map leaks are a wake-up call — here's how to monitor agent vulnerabilities

Comments
4 min read
Persona Persistence Attacks: When Your AI Agent's Soul File Becomes a Backdoor

Persona Persistence Attacks: When Your AI Agent's Soul File Becomes a Backdoor

Comments
2 min read
I Read All 512,000 Lines of Claude Code's Leaked Source — Here's What Anthropic Was Hiding

I Read All 512,000 Lines of Claude Code's Leaked Source — Here's What Anthropic Was Hiding

Comments
2 min read
I Tested 6 Attacks on Multi-Agent Systems — Here's Which Ones Agents Can't See
Cover image for I Tested 6 Attacks on Multi-Agent Systems — Here's Which Ones Agents Can't See

I Tested 6 Attacks on Multi-Agent Systems — Here's Which Ones Agents Can't See

Comments
4 min read
How We Tripled an AI Agent's Security Score Without Changing the Model

How We Tripled an AI Agent's Security Score Without Changing the Model

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.