Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Kubernetes Workloads with DevSecOps
Cover image for Securing Kubernetes Workloads with DevSecOps

Securing Kubernetes Workloads with DevSecOps

Comments
5 min read
How I Built a Python Network Scanner That Thinks Like an Attacker

How I Built a Python Network Scanner That Thinks Like an Attacker

Comments
4 min read
AI Powered Attacks Are Hitting Firewalls

AI Powered Attacks Are Hitting Firewalls

1
Comments 1
5 min read
💡 The Hidden Cost of Trusting Default Security Po
Cover image for 💡 The Hidden Cost of Trusting Default Security Po

💡 The Hidden Cost of Trusting Default Security Po

1
Comments
4 min read
Stop Running Risky One-Off Commands as Root: Sandbox Them with systemd-run

Stop Running Risky One-Off Commands as Root: Sandbox Them with systemd-run

1
Comments
3 min read
Meet StatlerScore, a Credit Score for your Cloud

Meet StatlerScore, a Credit Score for your Cloud

1
Comments
5 min read
Authorization Abuse Is the New Smart Contract Hack: Defending DeFi in the Phishing Era

Authorization Abuse Is the New Smart Contract Hack: Defending DeFi in the Phishing Era

1
Comments
5 min read
AIMomentz CAP-SRP: How We Built a Cryptographic Audit Trail for AI Image Refusals in ~8,000 Lines of PHP
Cover image for AIMomentz CAP-SRP: How We Built a Cryptographic Audit Trail for AI Image Refusals in ~8,000 Lines of PHP

AIMomentz CAP-SRP: How We Built a Cryptographic Audit Trail for AI Image Refusals in ~8,000 Lines of PHP

1
Comments
15 min read
Το Ταξίδι του JWT Όταν η Εμπιστοσύνη Γίνεται Token

Το Ταξίδι του JWT Όταν η Εμπιστοσύνη Γίνεται Token

Comments
1 min read
Securing Drupal Architectures at Scale: The 24-Hour SLA
Cover image for Securing Drupal Architectures at Scale: The 24-Hour SLA

Securing Drupal Architectures at Scale: The 24-Hour SLA

1
Comments
2 min read
Fragile Constraints: What Happens When AI Makes Rewriting Free

Fragile Constraints: What Happens When AI Makes Rewriting Free

1
Comments
7 min read
Using LLMs to do security analysis at the git diff level — what works, what doesn't, and why structured output matters
Cover image for Using LLMs to do security analysis at the git diff level — what works, what doesn't, and why structured output matters

Using LLMs to do security analysis at the git diff level — what works, what doesn't, and why structured output matters

4
Comments
4 min read
Linxr | Part 2 — Shipping QEMU in an APK

Linxr | Part 2 — Shipping QEMU in an APK

1
Comments
3 min read
Bringing Your Own Data into Microsoft 365 Copilot (Without Breaking Security)

Bringing Your Own Data into Microsoft 365 Copilot (Without Breaking Security)

Comments
7 min read
RAG Security 101: Protecting Your Retrieval-Augmented Generation Pipeline

RAG Security 101: Protecting Your Retrieval-Augmented Generation Pipeline

1
Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.