Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Web Shell Attacks

Understanding Web Shell Attacks

1
Comments
4 min read
Agentic AI Is Changing the Security Model for Enterprise Systems: What CISOs Need to Fix Now
Cover image for Agentic AI Is Changing the Security Model for Enterprise Systems: What CISOs Need to Fix Now

Agentic AI Is Changing the Security Model for Enterprise Systems: What CISOs Need to Fix Now

Comments 1
8 min read
How to Build Secure Webhook Endpoints in Node.js (2026 Guide)

How to Build Secure Webhook Endpoints in Node.js (2026 Guide)

Comments
6 min read
How a corruption-convicted company broke Chile's national ID system — and walked away with $480M
Cover image for How a corruption-convicted company broke Chile's national ID system — and walked away with $480M

How a corruption-convicted company broke Chile's national ID system — and walked away with $480M

2
Comments
15 min read
News that matters (agents): Governance finally noticed us

News that matters (agents): Governance finally noticed us

Comments
4 min read
AWS Network Firewall blocked 0.59% of exploits in independent testing - what this means for your cloud

AWS Network Firewall blocked 0.59% of exploits in independent testing - what this means for your cloud

1
Comments
11 min read
How I Built a Phishing Email Analyzer That Scores Risk 0–100

How I Built a Phishing Email Analyzer That Scores Risk 0–100

Comments
4 min read
6 Next.js Server Action Security Patterns That Prevent Real Exploits in Production

6 Next.js Server Action Security Patterns That Prevent Real Exploits in Production

2
Comments 1
3 min read
Day 27: Lateral Movement Strategy — Why Credentials Trump Pivoting 🕵️‍♂️

Day 27: Lateral Movement Strategy — Why Credentials Trump Pivoting 🕵️‍♂️

Comments
1 min read
I built Anubis-inspired PoW bot protection for static sites — no server needed

I built Anubis-inspired PoW bot protection for static sites — no server needed

Comments
2 min read
Building a Provably Fair Real-Time Game: The Limits of Trust and Intel SGX

Building a Provably Fair Real-Time Game: The Limits of Trust and Intel SGX

Comments
6 min read
Your AI Agent Has Root Access. Now What?

Your AI Agent Has Root Access. Now What?

Comments
4 min read
Review: Clinejection Incident Analysis and Release-Pipeline Hardening for WordPress/Drupal Agent Teams
Cover image for Review: Clinejection Incident Analysis and Release-Pipeline Hardening for WordPress/Drupal Agent Teams

Review: Clinejection Incident Analysis and Release-Pipeline Hardening for WordPress/Drupal Agent Teams

1
Comments
4 min read
I built "npm audit" for AI agents

I built "npm audit" for AI agents

Comments
4 min read
I Checked What Security Vulnerabilities AI Coding Tools Actually Introduce
Cover image for I Checked What Security Vulnerabilities AI Coding Tools Actually Introduce

I Checked What Security Vulnerabilities AI Coding Tools Actually Introduce

1
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.