Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock
Cover image for Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

1
Comments 1
3 min read
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management
Cover image for The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

1
Comments
6 min read
Watch Out for These Slash-Like Unicode Characters in Phishing Links
Cover image for Watch Out for These Slash-Like Unicode Characters in Phishing Links

Watch Out for These Slash-Like Unicode Characters in Phishing Links

Comments
2 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI
Cover image for Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
HTB - Support - Windows (Easy)

HTB - Support - Windows (Easy)

1
Comments
1 min read
AI Scams in 2025: 7 Real Examples and How to Avoid Them

AI Scams in 2025: 7 Real Examples and How to Avoid Them

Comments
3 min read
How I Reduced ELB Access Log Analysis Time by 80% Using AWS Data Processing MCP Server

How I Reduced ELB Access Log Analysis Time by 80% Using AWS Data Processing MCP Server

3
Comments
4 min read
Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems
Cover image for Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

1
Comments
6 min read
Snowflake

Snowflake

Comments
1 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI
Cover image for Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Comments
1 min read
Five ways ngrokkers 'doglab' gateways for homelabs and side projects
Cover image for Five ways ngrokkers 'doglab' gateways for homelabs and side projects

Five ways ngrokkers 'doglab' gateways for homelabs and side projects

3
Comments
3 min read
Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future
Cover image for Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

6
Comments
3 min read
The deceptive simplicity of auth

The deceptive simplicity of auth

2
Comments
3 min read
How Termux Helps You Learn Linux and Cybersecurity

How Termux Helps You Learn Linux and Cybersecurity

1
Comments
4 min read
Cybr - Beginner's Guide to AWS CloudTrail for Security

Cybr - Beginner's Guide to AWS CloudTrail for Security

Comments
1 min read
Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

2
Comments
4 min read
Elon Musk's AI chatbot churns out antisemitic posts days after update
Cover image for Elon Musk's AI chatbot churns out antisemitic posts days after update

Elon Musk's AI chatbot churns out antisemitic posts days after update

Comments
1 min read
How Resolve Mixed Content Warnings After Installing SSL
Cover image for How Resolve Mixed Content Warnings After Installing SSL

How Resolve Mixed Content Warnings After Installing SSL

1
Comments
5 min read
Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Comments
1 min read
AI Governance in Banking - Key Challenges and Compliance Requirements

AI Governance in Banking - Key Challenges and Compliance Requirements

Comments
5 min read
Why Your CLI Tool Needs OAuth (Not API Keys)

Why Your CLI Tool Needs OAuth (Not API Keys)

Comments
3 min read
VPC Security: Building Fortress-Like Network Architecture
Cover image for VPC Security: Building Fortress-Like Network Architecture

VPC Security: Building Fortress-Like Network Architecture

1
Comments
6 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025
Cover image for When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
Security isn't a feature. It's a mindset.
Cover image for Security isn't a feature. It's a mindset.

Security isn't a feature. It's a mindset.

6
Comments
1 min read
loading...