Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Use Suricata as An Intrusion Detection System on AWS

Use Suricata as An Intrusion Detection System on AWS

1
Comments
46 min read
Forget Manual Logs: Building a Real-Time Medication Compliance Auditor with YOLOv10 and TensorRT

Forget Manual Logs: Building a Real-Time Medication Compliance Auditor with YOLOv10 and TensorRT

1
Comments
3 min read
Agentic AI Has a Security Problem and Most Developers Are Not Ready
Cover image for Agentic AI Has a Security Problem and Most Developers Are Not Ready

Agentic AI Has a Security Problem and Most Developers Are Not Ready

1
Comments
6 min read
I built a zero-knowledge secret sharing tool because I was tired of passwords in Slack
Cover image for I built a zero-knowledge secret sharing tool because I was tired of passwords in Slack

I built a zero-knowledge secret sharing tool because I was tired of passwords in Slack

1
Comments
5 min read
The Art of Failing Forward: What Penetration Testing Taught Me About Growth

The Art of Failing Forward: What Penetration Testing Taught Me About Growth

Comments
3 min read
Malwarebytes Calls OpenClaw 'An Over-Eager Intern' — Here's What To Do About It

Malwarebytes Calls OpenClaw 'An Over-Eager Intern' — Here's What To Do About It

Comments
2 min read
40,000 Exposed OpenClaw Instances — and 6 New CVEs This Week

40,000 Exposed OpenClaw Instances — and 6 New CVEs This Week

Comments
3 min read
Base64 Encoding Explained: When, Why, and How to Use It

Base64 Encoding Explained: When, Why, and How to Use It

Comments
2 min read
Dispatch From the Other Side: Aligned Incentives
Cover image for Dispatch From the Other Side: Aligned Incentives

Dispatch From the Other Side: Aligned Incentives

1
Comments
2 min read
CVE-2026-27942: Infinite Loops & Broken Dreams: The fast-xml-parser Stack Exhaustion

CVE-2026-27942: Infinite Loops & Broken Dreams: The fast-xml-parser Stack Exhaustion

Comments
2 min read
HTML Entities: The Complete Guide to Special Characters and XSS Prevention

HTML Entities: The Complete Guide to Special Characters and XSS Prevention

Comments
2 min read
Starkiller Phishing: MFA Bypass via Reverse Proxies

Starkiller Phishing: MFA Bypass via Reverse Proxies

Comments
6 min read
I realized my AI tools were leaking sensitive data. So I built a local proxy to stop it
Cover image for I realized my AI tools were leaking sensitive data. So I built a local proxy to stop it

I realized my AI tools were leaking sensitive data. So I built a local proxy to stop it

Comments
3 min read
How to Stop Your App from Leaking User Locations (Yes, It Matters)
Cover image for How to Stop Your App from Leaking User Locations (Yes, It Matters)

How to Stop Your App from Leaking User Locations (Yes, It Matters)

1
Comments
5 min read
CVE-2026-27965: Manifest Destiny: How Vitess Backups Became a Shell-Popping Paradise

CVE-2026-27965: Manifest Destiny: How Vitess Backups Became a Shell-Popping Paradise

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.