Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How Canary Tokens Detect System Prompt Leaks in Real Time

How Canary Tokens Detect System Prompt Leaks in Real Time

Comments
6 min read
I built a JS framework with zero dependencies. Here's why

I built a JS framework with zero dependencies. Here's why

Comments
1 min read
Add Authentication and MFA to Unreal Engine with Descope
Cover image for Add Authentication and MFA to Unreal Engine with Descope

Add Authentication and MFA to Unreal Engine with Descope

5
Comments
15 min read
COPPA Deadline: April 22, 2026 - Your 6-Step Checklist If You Haven't Started Yet

COPPA Deadline: April 22, 2026 - Your 6-Step Checklist If You Haven't Started Yet

Comments
4 min read
Every Day is Y2K
Cover image for Every Day is Y2K

Every Day is Y2K

Comments
2 min read
Axios Under Siege: SSRF, DoS, and an Active Supply Chain RAT
Cover image for Axios Under Siege: SSRF, DoS, and an Active Supply Chain RAT

Axios Under Siege: SSRF, DoS, and an Active Supply Chain RAT

2
Comments
12 min read
Your Agent Called the Wrong Agent — On Purpose

Your Agent Called the Wrong Agent — On Purpose

Comments
2 min read
MCP Security: Why Your AI Agent's Tool Calls Need a Firewall

MCP Security: Why Your AI Agent's Tool Calls Need a Firewall

1
Comments
10 min read
GDPR Erasure Is Not DELETE FROM users
Cover image for GDPR Erasure Is Not DELETE FROM users

GDPR Erasure Is Not DELETE FROM users

1
Comments
6 min read
Securely Decoding Minified JavaScript Stack Traces Without Third-Party Exposure

Securely Decoding Minified JavaScript Stack Traces Without Third-Party Exposure

Comments
11 min read
How to Prepare Your TLS Stack for Post-Quantum Cryptography Today
Cover image for How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

Comments
5 min read
Mythos..... An AI That Can Find and Exploit Zero-Day Vulnerabilities — What This Means for Cybersecurity
Cover image for Mythos..... An AI That Can Find and Exploit Zero-Day Vulnerabilities — What This Means for Cybersecurity

Mythos..... An AI That Can Find and Exploit Zero-Day Vulnerabilities — What This Means for Cybersecurity

3
Comments
4 min read
How a fake npm package made Cursor backdoor a Next.js admin route
Cover image for How a fake npm package made Cursor backdoor a Next.js admin route

How a fake npm package made Cursor backdoor a Next.js admin route

Comments
7 min read
BUILT. REFINED. LAUNCHED. THE PRODUCT SECURITY KNOWLEDGE BASE IS LIVE.
Cover image for BUILT. REFINED. LAUNCHED. THE PRODUCT SECURITY KNOWLEDGE BASE IS LIVE.

BUILT. REFINED. LAUNCHED. THE PRODUCT SECURITY KNOWLEDGE BASE IS LIVE.

Comments 1
1 min read
Prompt Injection Doesn't Come from Your Users
Cover image for Prompt Injection Doesn't Come from Your Users

Prompt Injection Doesn't Come from Your Users

Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.