Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
5 properties of agent custody

5 properties of agent custody

Comments
3 min read
Security by Design in the Age of Artificial Intelligence: Fundamentals, Risks and Resilience Strategies
Cover image for Security by Design in the Age of Artificial Intelligence: Fundamentals, Risks and Resilience Strategies

Security by Design in the Age of Artificial Intelligence: Fundamentals, Risks and Resilience Strategies

Comments
9 min read
Why Pattern-Matching Scanners Miss Structural Bugs (and What I Built Instead)
Cover image for Why Pattern-Matching Scanners Miss Structural Bugs (and What I Built Instead)

Why Pattern-Matching Scanners Miss Structural Bugs (and What I Built Instead)

3
Comments
5 min read
Getting CLI authentication right: the complete guide to all 4 methods
Cover image for Getting CLI authentication right: the complete guide to all 4 methods

Getting CLI authentication right: the complete guide to all 4 methods

Comments
15 min read
5 Signs a PDF Document Has Been Tampered With
Cover image for 5 Signs a PDF Document Has Been Tampered With

5 Signs a PDF Document Has Been Tampered With

Comments
7 min read
How to Check and Remove EXIF Data from Your Photos (2026 Guide)

How to Check and Remove EXIF Data from Your Photos (2026 Guide)

1
Comments 1
6 min read
🚨 Chrome Zero-Day Vulnerability Patched (CVE-2026-5859) – Immediate Action Required

🚨 Chrome Zero-Day Vulnerability Patched (CVE-2026-5859) – Immediate Action Required

Comments
1 min read
TryHackMe: Active Directory Basics Writeup
Cover image for TryHackMe: Active Directory Basics Writeup

TryHackMe: Active Directory Basics Writeup

Comments
5 min read
I built a free WordPress plugin to help with EU Cyber Resilience Act compliance

I built a free WordPress plugin to help with EU Cyber Resilience Act compliance

Comments
1 min read
Behind the Wall: What Firewalls Really See, Block, and Miss
Cover image for Behind the Wall: What Firewalls Really See, Block, and Miss

Behind the Wall: What Firewalls Really See, Block, and Miss

Comments
2 min read
Hardening Linux on Raspberry Pi 5
Cover image for Hardening Linux on Raspberry Pi 5

Hardening Linux on Raspberry Pi 5

1
Comments
9 min read
Claude Code Leak: Why Every Developer Building AI Systems Should Be Paying Attention

Claude Code Leak: Why Every Developer Building AI Systems Should Be Paying Attention

Comments
6 min read
LLM Code Vulnerabilities, GRU Router Exploits & `dnsight` CLI DNS Auditor

LLM Code Vulnerabilities, GRU Router Exploits & `dnsight` CLI DNS Auditor

Comments
3 min read
TryHackMe - Fresher's guide to rule become top 20% easily.
Cover image for TryHackMe - Fresher's guide to rule become top 20% easily.

TryHackMe - Fresher's guide to rule become top 20% easily.

Comments
5 min read
Anthropic Just Built a Model Too Dangerous to Release. They Called It Mythos.

Anthropic Just Built a Model Too Dangerous to Release. They Called It Mythos.

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.