Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware
Cover image for ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

Comments
5 min read
New Year, New Build: Traata Goes Mobile
Cover image for New Year, New Build: Traata Goes Mobile

New Year, New Build: Traata Goes Mobile

Comments
2 min read
Hardware-backed SSH authentication with YubiKey (FIDO2)
Cover image for Hardware-backed SSH authentication with YubiKey (FIDO2)

Hardware-backed SSH authentication with YubiKey (FIDO2)

Comments 3
3 min read
The Art Of System Awareness: Reading Signals With Code

The Art Of System Awareness: Reading Signals With Code

Comments
8 min read
Delete Your ChatGPT History. Right Now. 🚨
Cover image for Delete Your ChatGPT History. Right Now. 🚨

Delete Your ChatGPT History. Right Now. 🚨

7
Comments 2
2 min read
Excessive Agency in Agentic AI: Setting Safe Boundaries
Cover image for Excessive Agency in Agentic AI: Setting Safe Boundaries

Excessive Agency in Agentic AI: Setting Safe Boundaries

Comments
9 min read
Security news weekly round-up - 28th November 2025
Cover image for Security news weekly round-up - 28th November 2025

Security news weekly round-up - 28th November 2025

1
Comments
3 min read
How to Evaluate Smart Device + Token Projects: A Checklist for Crypto Investors & Builders

How to Evaluate Smart Device + Token Projects: A Checklist for Crypto Investors & Builders

Comments
2 min read
70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.
Cover image for 70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

Comments
1 min read
Redact PII Before Sending Data to LLMs: A Developer's Guide
Cover image for Redact PII Before Sending Data to LLMs: A Developer's Guide

Redact PII Before Sending Data to LLMs: A Developer's Guide

98
Comments 12
3 min read
Modernizing Telecom Security ML Powered Approach

Modernizing Telecom Security ML Powered Approach

Comments
5 min read
Limiting Public Access and Protecting Sensitive Data in Azure Storage
Cover image for Limiting Public Access and Protecting Sensitive Data in Azure Storage

Limiting Public Access and Protecting Sensitive Data in Azure Storage

Comments
3 min read
The Security Engineering Blueprint: A JavaScript Master Document
Cover image for The Security Engineering Blueprint: A JavaScript Master Document

The Security Engineering Blueprint: A JavaScript Master Document

Comments
4 min read
Environment Variables Without the Chaos: A Vault-First Approach
Cover image for Environment Variables Without the Chaos: A Vault-First Approach

Environment Variables Without the Chaos: A Vault-First Approach

Comments
13 min read
Beyond Filters: Rearchitecting Prompt Injection Defense
Cover image for Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.