Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Powershell 3 Layered Network

Powershell 3 Layered Network

2
Comments
5 min read
I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

Comments
1 min read
🔐 Fixing an XSS Vulnerability in a Quill-Based HTML Export Pipeline

🔐 Fixing an XSS Vulnerability in a Quill-Based HTML Export Pipeline

1
Comments 1
2 min read
GitHub Copilot Security Review: It Executes Malware With Zero Approval
Cover image for GitHub Copilot Security Review: It Executes Malware With Zero Approval

GitHub Copilot Security Review: It Executes Malware With Zero Approval

13
Comments 6
4 min read
From Cloud Engineer to Architect: Building the Right Skill Stack
Cover image for From Cloud Engineer to Architect: Building the Right Skill Stack

From Cloud Engineer to Architect: Building the Right Skill Stack

2
Comments 1
7 min read
We got tired of users asking "is this file legit?" so we built a verification system

We got tired of users asking "is this file legit?" so we built a verification system

Comments
2 min read
Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Comments
2 min read
Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud
Cover image for Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Comments
14 min read
You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained
Cover image for You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

Comments
10 min read
Configuring Microsoft Defender for Cloud for Enhanced Protection
Cover image for Configuring Microsoft Defender for Cloud for Enhanced Protection

Configuring Microsoft Defender for Cloud for Enhanced Protection

Comments
1 min read
Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide
Cover image for Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Comments
9 min read
30 CVEs and Counting: The MCP Security Crisis Nobody's Talking About

30 CVEs and Counting: The MCP Security Crisis Nobody's Talking About

Comments 1
6 min read
I built what browsers refused to ship: SRI for fetch()

I built what browsers refused to ship: SRI for fetch()

Comments
2 min read
Modular Isolation Architecture (MIA)
Cover image for Modular Isolation Architecture (MIA)

Modular Isolation Architecture (MIA)

Comments
2 min read
ASP.NET Core Security Explained: Modern Authentication, Authorization, and JWT
Cover image for ASP.NET Core Security Explained: Modern Authentication, Authorization, and JWT

ASP.NET Core Security Explained: Modern Authentication, Authorization, and JWT

1
Comments
15 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.