Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Was Tired of Spam, So I Built My Own Temporary Email System
Cover image for I Was Tired of Spam, So I Built My Own Temporary Email System

I Was Tired of Spam, So I Built My Own Temporary Email System

1
Comments 2
7 min read
Tech Pulse: December 23, 2025 - AI, Cybersecurity & Development News Roundup

Tech Pulse: December 23, 2025 - AI, Cybersecurity & Development News Roundup

Comments 1
3 min read
When Your Users Are Bots, Not People
Cover image for When Your Users Are Bots, Not People

When Your Users Are Bots, Not People

Comments
3 min read
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)
Cover image for Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Comments
7 min read
Day 22 — Chained Attack (The Final Confrontation)
Cover image for Day 22 — Chained Attack (The Final Confrontation)

Day 22 — Chained Attack (The Final Confrontation)

3
Comments
2 min read
JWT Is Not Secure — Until You Understand JWS and JWE
Cover image for JWT Is Not Secure — Until You Understand JWS and JWE

JWT Is Not Secure — Until You Understand JWS and JWE

5
Comments
3 min read
The Ephemeral Signal Ethics Manifesto

The Ephemeral Signal Ethics Manifesto

Comments
2 min read
Securing IoT Devices Without Agents Using Network-Based Machine Learning
Cover image for Securing IoT Devices Without Agents Using Network-Based Machine Learning

Securing IoT Devices Without Agents Using Network-Based Machine Learning

Comments
11 min read
The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works
Cover image for The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

5
Comments
6 min read
Kapbe Redefines Vaults: Why Systems Inevitably Destabilise When Yield Becomes the Only Metric?

Kapbe Redefines Vaults: Why Systems Inevitably Destabilise When Yield Becomes the Only Metric?

Comments
3 min read
AWS simplified Cloudtrail events monitoring using Cloudwatch Logs
Cover image for AWS simplified Cloudtrail events monitoring using Cloudwatch Logs

AWS simplified Cloudtrail events monitoring using Cloudwatch Logs

Comments
4 min read
How Bitcoin Boots Safely

How Bitcoin Boots Safely

Comments
11 min read
Logistics Software Testing: How to Do Quality Assurance for Logistics
Cover image for Logistics Software Testing: How to Do Quality Assurance for Logistics

Logistics Software Testing: How to Do Quality Assurance for Logistics

Comments
13 min read
Why Some Smart Contracts Pass an Audit… But Still Get Hacked.
Cover image for Why Some Smart Contracts Pass an Audit… But Still Get Hacked.

Why Some Smart Contracts Pass an Audit… But Still Get Hacked.

3
Comments
4 min read
The MEV Dark Pool Problem: Why Private Mempools Need Decentralized Verification

The MEV Dark Pool Problem: Why Private Mempools Need Decentralized Verification

Comments 2
4 min read
Goodbye Hidden Fields: Modern CSRF Protection Without Tokens

Goodbye Hidden Fields: Modern CSRF Protection Without Tokens

Comments 1
3 min read
AI Code Review for Compliance : Benefits and Best Practices
Cover image for AI Code Review for Compliance : Benefits and Best Practices

AI Code Review for Compliance : Benefits and Best Practices

Comments
4 min read
A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbit💫
Cover image for A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbit💫

A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbit💫

Comments
1 min read
I Monkey-Patched Python to Stop AI Agents from Accessing Private Networks

I Monkey-Patched Python to Stop AI Agents from Accessing Private Networks

Comments 1
3 min read
Adversarial AI and Robustness Engineering: Attacks, Defenses, and Trust

Adversarial AI and Robustness Engineering: Attacks, Defenses, and Trust

Comments
6 min read
Set Up SSO with Auth0 for Seamless App Access and Security
Cover image for Set Up SSO with Auth0 for Seamless App Access and Security

Set Up SSO with Auth0 for Seamless App Access and Security

1
Comments
5 min read
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means
Cover image for When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

Comments
4 min read
Tech Pulse: Wrapping 2025, Igniting 2026
Cover image for Tech Pulse: Wrapping 2025, Igniting 2026

Tech Pulse: Wrapping 2025, Igniting 2026

20
Comments
3 min read
🎵 Build a Real-Time Spotify Dashboard with Next.js (Part 1: The Auth)
Cover image for 🎵 Build a Real-Time Spotify Dashboard with Next.js (Part 1: The Auth)

🎵 Build a Real-Time Spotify Dashboard with Next.js (Part 1: The Auth)

Comments
5 min read
🛡️ AWS Config Drift Detection Lab - Beginner-Friendly Guide

🛡️ AWS Config Drift Detection Lab - Beginner-Friendly Guide

Comments
6 min read
loading...