Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What Google’s 2025 Zero-Day Report Means for Network Security Engineers

What Google’s 2025 Zero-Day Report Means for Network Security Engineers

Comments
5 min read
# Your AI Agents Are Talking — But Can You Prove What They Said?

# Your AI Agents Are Talking — But Can You Prove What They Said?

1
Comments
5 min read
Chrome Modernizes XML Parsing: Replacing libxml2 with Rust for Enhanced Security and Performance

Chrome Modernizes XML Parsing: Replacing libxml2 with Rust for Enhanced Security and Performance

Comments
13 min read
The Upstream Proxy: How Claude Code Intercepts Subprocess HTTP Traffic

The Upstream Proxy: How Claude Code Intercepts Subprocess HTTP Traffic

Comments
21 min read
Ditch Static IAM Keys: Run Terraform with AWS SSO
Cover image for Ditch Static IAM Keys: Run Terraform with AWS SSO

Ditch Static IAM Keys: Run Terraform with AWS SSO

Comments
6 min read
How to Fix Wildcard CORS in Cursor-Generated Code (CWE-942)
Cover image for How to Fix Wildcard CORS in Cursor-Generated Code (CWE-942)

How to Fix Wildcard CORS in Cursor-Generated Code (CWE-942)

2
Comments
3 min read
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
Cover image for The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)

The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)

Comments
6 min read
Malicious Code Hidden in Build Config Files Exploits Trust in PRs: Enhanced Scrutiny and Automated Checks Proposed

Malicious Code Hidden in Build Config Files Exploits Trust in PRs: Enhanced Scrutiny and Automated Checks Proposed

Comments
11 min read
Production-Ready Docker Deployment: Secrets Overlay and Auto-Provisioning
Cover image for Production-Ready Docker Deployment: Secrets Overlay and Auto-Provisioning

Production-Ready Docker Deployment: Secrets Overlay and Auto-Provisioning

Comments
5 min read
Anatomy of a DeFi Hack: Reentrancy Deep Dive

Anatomy of a DeFi Hack: Reentrancy Deep Dive

Comments
2 min read
Contagious Interview: 1,700 Malicious Packages Across npm, PyPI, Go, Rust
Cover image for Contagious Interview: 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Contagious Interview: 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Comments
5 min read
5 properties of agent custody

5 properties of agent custody

Comments
3 min read
Security by Design in the Age of Artificial Intelligence: Fundamentals, Risks and Resilience Strategies
Cover image for Security by Design in the Age of Artificial Intelligence: Fundamentals, Risks and Resilience Strategies

Security by Design in the Age of Artificial Intelligence: Fundamentals, Risks and Resilience Strategies

Comments
9 min read
Why Pattern-Matching Scanners Miss Structural Bugs (and What I Built Instead)
Cover image for Why Pattern-Matching Scanners Miss Structural Bugs (and What I Built Instead)

Why Pattern-Matching Scanners Miss Structural Bugs (and What I Built Instead)

3
Comments
5 min read
Getting CLI authentication right: the complete guide to all 4 methods
Cover image for Getting CLI authentication right: the complete guide to all 4 methods

Getting CLI authentication right: the complete guide to all 4 methods

Comments
15 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.