Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How Formo Uses Subresource Integrity (SRI) to Protect Your Users

How Formo Uses Subresource Integrity (SRI) to Protect Your Users

Comments
7 min read
Securing MCP Servers: The 2026 Guide to AI Tool Tunneling

Securing MCP Servers: The 2026 Guide to AI Tool Tunneling

1
Comments
11 min read
How to Set Up JWT Authentication in Spring Boot (Complete Step-by-Step Guide)

How to Set Up JWT Authentication in Spring Boot (Complete Step-by-Step Guide)

1
Comments
17 min read
Stop Guessing, Start Measuring: Why Your App Needs a Shannon Entropy Check
Cover image for Stop Guessing, Start Measuring: Why Your App Needs a Shannon Entropy Check

Stop Guessing, Start Measuring: Why Your App Needs a Shannon Entropy Check

2
Comments
2 min read
Sybil Attacks in Crypto & DeFi: Risks, Examples, and How to Prevent Them

Sybil Attacks in Crypto & DeFi: Risks, Examples, and How to Prevent Them

Comments
9 min read
I Found Corporate Networks Hidden Behind Porn Sites — Same Tracker Fingerprints, Different Brands

I Found Corporate Networks Hidden Behind Porn Sites — Same Tracker Fingerprints, Different Brands

Comments
5 min read
WaspSting - Penetration Testing & Bug Bounty Tool

WaspSting - Penetration Testing & Bug Bounty Tool

Comments
9 min read
I Scanned 300 Vibe-Coded Repos. The #1 Finding Will Annoy You.
Cover image for I Scanned 300 Vibe-Coded Repos. The #1 Finding Will Annoy You.

I Scanned 300 Vibe-Coded Repos. The #1 Finding Will Annoy You.

Comments
3 min read
2026 Post-Quantum Tunnels: Fighting Harvest Now, Decrypt Later

2026 Post-Quantum Tunnels: Fighting Harvest Now, Decrypt Later

1
Comments
11 min read
Supply Chain Security for Developers: Protecting Your CI/CD Pipeline in 2026

Supply Chain Security for Developers: Protecting Your CI/CD Pipeline in 2026

Comments
6 min read
World ID Verification: Prove Your Humanity, Anonymously

World ID Verification: Prove Your Humanity, Anonymously

Comments
2 min read
Semantic Gradient Evasion: How Embedding-Based Drift Detectors Can Be Bypassed Step by Step

Semantic Gradient Evasion: How Embedding-Based Drift Detectors Can Be Bypassed Step by Step

2
Comments
10 min read
AWS PrivateLink - Acceso a Instancias EC2 Privadas a través de VPC endpoints y Systems Manager (en español sencillo)

AWS PrivateLink - Acceso a Instancias EC2 Privadas a través de VPC endpoints y Systems Manager (en español sencillo)

Comments
5 min read
How We Built Process-Tree Agent Detection

How We Built Process-Tree Agent Detection

Comments
7 min read
I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)
Cover image for I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)

I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)

3
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.