Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

2
Comments
6 min read
Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐
Cover image for Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐

Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐

4
Comments 1
1 min read
How to Attack a RAG System — and Why Your Security Scanner Won't Catch It

How to Attack a RAG System — and Why Your Security Scanner Won't Catch It

Comments 1
6 min read
We stress-tested our own AI agent guardrails before launch. Here's what broke.

We stress-tested our own AI agent guardrails before launch. Here's what broke.

Comments 5
5 min read
Your Identity System Is Your Biggest Single Point of Failure

Your Identity System Is Your Biggest Single Point of Failure

1
Comments
5 min read
How to hash passwords before saving it on database in Node.js
Cover image for How to hash passwords before saving it on database in Node.js

How to hash passwords before saving it on database in Node.js

1
Comments 2
2 min read
How to Measure Passkey Adoption: Funnels, Activation, and Device Insights
Cover image for How to Measure Passkey Adoption: Funnels, Activation, and Device Insights

How to Measure Passkey Adoption: Funnels, Activation, and Device Insights

Comments
3 min read
Secure Remote Access to AWS Resources from On-Premises
Cover image for Secure Remote Access to AWS Resources from On-Premises

Secure Remote Access to AWS Resources from On-Premises

6
Comments
2 min read
🔑 Cloud Policy Abuse: The IAM Blind Spot
Cover image for 🔑 Cloud Policy Abuse: The IAM Blind Spot

🔑 Cloud Policy Abuse: The IAM Blind Spot

Comments
6 min read
Your AI Agent Can Read Every Secret in Your .env File Right Now — Here's Proof

Your AI Agent Can Read Every Secret in Your .env File Right Now — Here's Proof

5
Comments
5 min read
Sub-Table Security

Sub-Table Security

Comments
12 min read
Linux 서버 보안 모델 완벽 가이드 - 시크릿 관리와 프로세스 격리

Linux 서버 보안 모델 완벽 가이드 - 시크릿 관리와 프로세스 격리

Comments
3 min read
A Practical Guide to Production-Ready Auth (For Senior Full-Stack Devs)

A Practical Guide to Production-Ready Auth (For Senior Full-Stack Devs)

Comments
4 min read
Curl Gets Rid Of Its Bug Bounty Program Over Ai Sl

Curl Gets Rid Of Its Bug Bounty Program Over Ai Sl

Comments
7 min read
How to Add AI Safety Testing to Your CI/CD Pipeline

How to Add AI Safety Testing to Your CI/CD Pipeline

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.