Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Shadow AI Governance Crisis: The Uncontrolled AI Tool Threat

Shadow AI Governance Crisis: The Uncontrolled AI Tool Threat

Comments
10 min read
I Almost Installed a Malicious Python Package: So, I Built trustcheck
Cover image for I Almost Installed a Malicious Python Package: So, I Built trustcheck

I Almost Installed a Malicious Python Package: So, I Built trustcheck

5
Comments
3 min read
Setting Up a Secure FTP Server on Ubuntu (Using vsftpd)

Setting Up a Secure FTP Server on Ubuntu (Using vsftpd)

Comments
4 min read
The dependency vulnerability gap that CI/CD can’t fix
Cover image for The dependency vulnerability gap that CI/CD can’t fix

The dependency vulnerability gap that CI/CD can’t fix

Comments
2 min read
Compound Risk is a Bigger Problem Than Missing Checks

Compound Risk is a Bigger Problem Than Missing Checks

Comments
5 min read
Your AI Agent Is One Bad URL Away From Being Compromised
Cover image for Your AI Agent Is One Bad URL Away From Being Compromised

Your AI Agent Is One Bad URL Away From Being Compromised

Comments
3 min read
Why Deepfake Allegations Are Hard to Assess From Redistributed Video
Cover image for Why Deepfake Allegations Are Hard to Assess From Redistributed Video

Why Deepfake Allegations Are Hard to Assess From Redistributed Video

Comments
4 min read
We Analyzed 4,584 MCP Servers — The Average Trust Score Is 53.9 Out of 100

We Analyzed 4,584 MCP Servers — The Average Trust Score Is 53.9 Out of 100

Comments 1
3 min read
Envelope Encryption for .env Files, the Right Way (PHP CLI, Stdlib Only)

Envelope Encryption for .env Files, the Right Way (PHP CLI, Stdlib Only)

Comments
9 min read
The Tradeoff Every Secrets Manager Forces on You (And Why It's the Server's Fault)
Cover image for The Tradeoff Every Secrets Manager Forces on You (And Why It's the Server's Fault)

The Tradeoff Every Secrets Manager Forces on You (And Why It's the Server's Fault)

Comments
3 min read
Nine Seconds: What PocketOS Tells Us About the Limits of Agent Authorization

Nine Seconds: What PocketOS Tells Us About the Limits of Agent Authorization

1
Comments 1
4 min read
Full Stack Monitoring: A Security-First Approach

Full Stack Monitoring: A Security-First Approach

Comments
8 min read
Authproof

Authproof

Comments
1 min read
FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation
Cover image for FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation

FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation

1
Comments 1
5 min read
How We Use the Web Crypto API to Build a Truly Fair Random Name Picker Wheel

How We Use the Web Crypto API to Build a Truly Fair Random Name Picker Wheel

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.