Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Singleton Design Pattern: A Complete Guide for Developers
Cover image for The Singleton Design Pattern: A Complete Guide for Developers

The Singleton Design Pattern: A Complete Guide for Developers

1
Comments
5 min read
BCOS: Why Open Source Needs a Human Trust Layer in the AI Agent Era

BCOS: Why Open Source Needs a Human Trust Layer in the AI Agent Era

1
Comments
5 min read
What Is Static Code Analysis and How Does It Work

What Is Static Code Analysis and How Does It Work

12
Comments
18 min read
Week 6 Scripting Challenge: Building a Security Log Correlator

Week 6 Scripting Challenge: Building a Security Log Correlator

Comments
35 min read
The Night I Almost Lost Everything: A Guide to Stopping Reentrancy Attacks
Cover image for The Night I Almost Lost Everything: A Guide to Stopping Reentrancy Attacks

The Night I Almost Lost Everything: A Guide to Stopping Reentrancy Attacks

Comments
2 min read
Maintaining truthful docs over time: how to keep security claims honest
Cover image for Maintaining truthful docs over time: how to keep security claims honest

Maintaining truthful docs over time: how to keep security claims honest

1
Comments
4 min read
Fixing MariaDB ERROR 2002 (HY000): TLS Handshake Fails with “Host Is Not Allowed to Connect”

Fixing MariaDB ERROR 2002 (HY000): TLS Handshake Fails with “Host Is Not Allowed to Connect”

Comments
3 min read
Security news weekly round-up - 23rd January 2026
Cover image for Security news weekly round-up - 23rd January 2026

Security news weekly round-up - 23rd January 2026

Comments
2 min read
CVE-2026-24009: YAML Deserialization: The Gift That Keeps on Giving in Docling-Core

CVE-2026-24009: YAML Deserialization: The Gift That Keeps on Giving in Docling-Core

Comments
2 min read
AI Agents Lost $600K+ to Prompt Injection — Attack Taxonomy & Code-Level Defenses

AI Agents Lost $600K+ to Prompt Injection — Attack Taxonomy & Code-Level Defenses

1
Comments
2 min read
Navigating the Software-to-Cybersecurity Transition: A Fortune 500 Practitioner's Blueprint
Cover image for Navigating the Software-to-Cybersecurity Transition: A Fortune 500 Practitioner's Blueprint

Navigating the Software-to-Cybersecurity Transition: A Fortune 500 Practitioner's Blueprint

Comments
11 min read
The killer’s signature wasn’t on the weapon, it was in the code.
Cover image for The killer’s signature wasn’t on the weapon, it was in the code.

The killer’s signature wasn’t on the weapon, it was in the code.

1
Comments 3
1 min read
FortiGate Secure Enterprise Network
Cover image for FortiGate Secure Enterprise Network

FortiGate Secure Enterprise Network

1
Comments
3 min read
CVE-2026-0798: Gitea's Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers

CVE-2026-0798: Gitea's Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers

Comments
2 min read
Build Secure, Production-Ready AI Agents with Bifrost’s MCP Gateway

Build Secure, Production-Ready AI Agents with Bifrost’s MCP Gateway

5
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.