Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Death of Cookie Theft: Understanding Device Bound Session Credentials (DBSC)
Cover image for The Death of Cookie Theft: Understanding Device Bound Session Credentials (DBSC)

The Death of Cookie Theft: Understanding Device Bound Session Credentials (DBSC)

2
Comments 2
6 min read
Quantum Nets: Unmasking Financial Fraud with Unprecedented Accuracy by Arvind Sundararajan

Quantum Nets: Unmasking Financial Fraud with Unprecedented Accuracy by Arvind Sundararajan

Comments
2 min read
Why Your AI Agent Needs a Passport
Cover image for Why Your AI Agent Needs a Passport

Why Your AI Agent Needs a Passport

1
Comments
3 min read
Exploit Analysis: PostgreSQL COPY FROM Filesystem Access
Cover image for Exploit Analysis: PostgreSQL COPY FROM Filesystem Access

Exploit Analysis: PostgreSQL COPY FROM Filesystem Access

Comments
4 min read
Secure Serverless with HashiCorp Vault and Lambda: Dynamic Database Credentials
Cover image for Secure Serverless with HashiCorp Vault and Lambda: Dynamic Database Credentials

Secure Serverless with HashiCorp Vault and Lambda: Dynamic Database Credentials

6
Comments 1
5 min read
Pixel-Powered Encryption: Turning an Image into a Key with Python

Pixel-Powered Encryption: Turning an Image into a Key with Python

1
Comments
2 min read
NFS, SMB, and File Sharing

NFS, SMB, and File Sharing

Comments
6 min read
Exploit Analysis: search_path Hijacking (The Hidden PostgreSQL Attack)
Cover image for Exploit Analysis: search_path Hijacking (The Hidden PostgreSQL Attack)

Exploit Analysis: search_path Hijacking (The Hidden PostgreSQL Attack)

Comments
2 min read
Securing Middleware: The Express.js Static Analysis Standard
Cover image for Securing Middleware: The Express.js Static Analysis Standard

Securing Middleware: The Express.js Static Analysis Standard

Comments
3 min read
Applying CIS Hardening for Linux Servers Using Ansible Automation

Applying CIS Hardening for Linux Servers Using Ansible Automation

Comments
4 min read
CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security
Cover image for CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

2
Comments
3 min read
VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

Comments
8 min read
Frontend Protection: The Browser Static Analysis Standard
Cover image for Frontend Protection: The Browser Static Analysis Standard

Frontend Protection: The Browser Static Analysis Standard

Comments
2 min read
Zero-Trust Auth: The JWT Static Analysis Standard
Cover image for Zero-Trust Auth: The JWT Static Analysis Standard

Zero-Trust Auth: The JWT Static Analysis Standard

Comments
3 min read
Runtime Security at Scale: The Node.js Static Analysis Standard
Cover image for Runtime Security at Scale: The Node.js Static Analysis Standard

Runtime Security at Scale: The Node.js Static Analysis Standard

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.