Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)
Cover image for The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)

The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)

Comments
8 min read
"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome
Cover image for "Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

Comments
2 min read
Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research
Cover image for Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research

Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research

Comments
2 min read
How to Prevent Objects from Being Modified in JavaScript
Cover image for How to Prevent Objects from Being Modified in JavaScript

How to Prevent Objects from Being Modified in JavaScript

Comments
2 min read
Critical Security Vulnerability Found in React Server Components (RSC)

Critical Security Vulnerability Found in React Server Components (RSC)

2
Comments 1
1 min read
Beyond Code: The Obsessive Knowledge That Makes You Dangerous
Cover image for Beyond Code: The Obsessive Knowledge That Makes You Dangerous

Beyond Code: The Obsessive Knowledge That Makes You Dangerous

Comments
9 min read
Implementing Authentication Middleware in Next.js with i18n Support
Cover image for Implementing Authentication Middleware in Next.js with i18n Support

Implementing Authentication Middleware in Next.js with i18n Support

Comments
3 min read
Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

2
Comments
17 min read
Day 5 — Environment Drift (The Fog in the Valley)
Cover image for Day 5 — Environment Drift (The Fog in the Valley)

Day 5 — Environment Drift (The Fog in the Valley)

8
Comments
2 min read
Amazon EKS adds native support for the AWS Secrets Store CSI Driver Provider

Amazon EKS adds native support for the AWS Secrets Store CSI Driver Provider

Comments
1 min read
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

1
Comments
7 min read
Key Take-a-Ways From Microsoft Ignite 2025

Key Take-a-Ways From Microsoft Ignite 2025

Comments
4 min read
Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)
Cover image for Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Comments
2 min read
Who’s Got the Keys to Your Data? PIM’s Here to Play Bouncer!

Who’s Got the Keys to Your Data? PIM’s Here to Play Bouncer!

Comments
3 min read
Prompt Injection: What Security Managers Need to Know

Prompt Injection: What Security Managers Need to Know

Comments
15 min read
Software Fun-duh-mentals - DNS
Cover image for Software Fun-duh-mentals - DNS

Software Fun-duh-mentals - DNS

Comments
3 min read
Why the MITRE ATT&CK Framework Actually Works

Why the MITRE ATT&CK Framework Actually Works

Comments
6 min read
Introducing SSH Secure Audit: A Lightweight Open-Source SSH Security Scanner for Linux

Introducing SSH Secure Audit: A Lightweight Open-Source SSH Security Scanner for Linux

1
Comments
1 min read
AuthController

AuthController

Comments
2 min read
NIRAPAD Alliance Just Launched: A Major National Effort for Mental Health & Cyber Safety 🇧🇩
Cover image for NIRAPAD Alliance Just Launched: A Major National Effort for Mental Health & Cyber Safety 🇧🇩

NIRAPAD Alliance Just Launched: A Major National Effort for Mental Health & Cyber Safety 🇧🇩

10
Comments 2
2 min read
TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

Comments
4 min read
Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB
Cover image for Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB

Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB

1
Comments
20 min read
Erase & Protect: Face Anonymization Without the AI Training Hassle by Arvind Sundararajan

Erase & Protect: Face Anonymization Without the AI Training Hassle by Arvind Sundararajan

1
Comments
2 min read
Secure Agent Database Access: Architecture Patterns That Actually Work
Cover image for Secure Agent Database Access: Architecture Patterns That Actually Work

Secure Agent Database Access: Architecture Patterns That Actually Work

Comments
15 min read
Why I Stopped Using LocalStorage for Auth and What You Should Do Instead
Cover image for Why I Stopped Using LocalStorage for Auth and What You Should Do Instead

Why I Stopped Using LocalStorage for Auth and What You Should Do Instead

1
Comments
7 min read
loading...