Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws
Cover image for How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws

How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws

Comments
14 min read
🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

Comments
1 min read
How to Generate Secure JWT Secrets: A Complete Guide for Developers

How to Generate Secure JWT Secrets: A Complete Guide for Developers

1
Comments
4 min read
Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)
Cover image for Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Comments
5 min read
🚀 Modern Security Guide for Java Developers

🚀 Modern Security Guide for Java Developers

4
Comments
3 min read
ATM Hacking: From Terminator 2 Fantasy to Red Team Reality
Cover image for ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

Comments
12 min read
DOKUMEN STANDAR: Laravel Safe Email System

DOKUMEN STANDAR: Laravel Safe Email System

Comments 1
4 min read
Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

1
Comments
6 min read
I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How
Cover image for I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How

I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How

Comments
10 min read
Django data protection engine: encrypted fields, GDPR-style soft delete and audit log

Django data protection engine: encrypted fields, GDPR-style soft delete and audit log

Comments
3 min read
Using Amp (AI) For Static Code Analysis

Using Amp (AI) For Static Code Analysis

Comments
4 min read
Beyond the Code: Advanced Human-Led Techniques in DeFi Security Auditing
Cover image for Beyond the Code: Advanced Human-Led Techniques in DeFi Security Auditing

Beyond the Code: Advanced Human-Led Techniques in DeFi Security Auditing

Comments
10 min read
TimeProofs v0.1 — A Free, Privacy-First Timestamp API for Developers (Public Beta)
Cover image for TimeProofs v0.1 — A Free, Privacy-First Timestamp API for Developers (Public Beta)

TimeProofs v0.1 — A Free, Privacy-First Timestamp API for Developers (Public Beta)

Comments
3 min read
The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

3
Comments
5 min read
🛡️ Entendiendo las Service Control Policies (SCPs) en AWS Organizations
Cover image for 🛡️ Entendiendo las Service Control Policies (SCPs) en AWS Organizations

🛡️ Entendiendo las Service Control Policies (SCPs) en AWS Organizations

2
Comments
11 min read
Bypassing Web Application Firewalls

Bypassing Web Application Firewalls

3
Comments
5 min read
Secrets Management: Vault, AWS Secrets Manager, or SOPS?

Secrets Management: Vault, AWS Secrets Manager, or SOPS?

Comments
11 min read
Role vs Permission: Why Your RBAC Shouldn't Use Role Checks

Role vs Permission: Why Your RBAC Shouldn't Use Role Checks

1
Comments
4 min read
IRP: The Semantic Model That Fixes AI-Native API Chaos

IRP: The Semantic Model That Fixes AI-Native API Chaos

Comments
2 min read
Emergency Server Recovery: A 4-Hour Race Against Time
Cover image for Emergency Server Recovery: A 4-Hour Race Against Time

Emergency Server Recovery: A 4-Hour Race Against Time

Comments
4 min read
Understanding Content Security Policy (CSP)
Cover image for Understanding Content Security Policy (CSP)

Understanding Content Security Policy (CSP)

Comments
9 min read
Análise de Vetores de Ataque em Arquitetura de Aplicações Web
Cover image for Análise de Vetores de Ataque em Arquitetura de Aplicações Web

Análise de Vetores de Ataque em Arquitetura de Aplicações Web

1
Comments
17 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Cover image for The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Image Scanning Tools (Anchore, Clair)

Image Scanning Tools (Anchore, Clair)

Comments
6 min read
Queen City Con 0x3: Hacking And Embracing Resiliency
Cover image for Queen City Con 0x3: Hacking And Embracing Resiliency

Queen City Con 0x3: Hacking And Embracing Resiliency

Comments
8 min read
loading...