Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Prompt injection 2026: Cursor, Claude Code, Copilot y Gemini bajo ataque
Cover image for Prompt injection 2026: Cursor, Claude Code, Copilot y Gemini bajo ataque

Prompt injection 2026: Cursor, Claude Code, Copilot y Gemini bajo ataque

Comments
9 min read
SimpleLogin vs anon.li - a developer's honest comparison

SimpleLogin vs anon.li - a developer's honest comparison

Comments
5 min read
Anatomy of a Real M365 Tenant

Anatomy of a Real M365 Tenant

Comments
15 min read
The Vercel Breach: When Your AI Tool's OAuth Becomes the Attack Vector

The Vercel Breach: When Your AI Tool's OAuth Becomes the Attack Vector

Comments
5 min read
Angular Security Deep Dive: CSS, DOM Manipulation, and XSS Prevention (2026 Edition)
Cover image for Angular Security Deep Dive: CSS, DOM Manipulation, and XSS Prevention (2026 Edition)

Angular Security Deep Dive: CSS, DOM Manipulation, and XSS Prevention (2026 Edition)

Comments
5 min read
Let's Encrypt short-lived certificates are quite strict, so you should use an ARI-capable client

Let's Encrypt short-lived certificates are quite strict, so you should use an ARI-capable client

Comments
4 min read
How to Crack the SAM Database in Kali Linux | Windows Password Hash Extraction Guide

How to Crack the SAM Database in Kali Linux | Windows Password Hash Extraction Guide

Comments
3 min read
🚀 I built a real-time security scanner for Laravel

🚀 I built a real-time security scanner for Laravel

Comments
1 min read
Telegram Bot Approvals: Mobile-First Transaction Signing for AI Agents
Cover image for Telegram Bot Approvals: Mobile-First Transaction Signing for AI Agents

Telegram Bot Approvals: Mobile-First Transaction Signing for AI Agents

Comments
5 min read
AI Agents Need Wallet Trust Profiles Before They Handle Money
Cover image for AI Agents Need Wallet Trust Profiles Before They Handle Money

AI Agents Need Wallet Trust Profiles Before They Handle Money

Comments
5 min read
What the Vercel Incident Teaches Us About Agent Credential Management

What the Vercel Incident Teaches Us About Agent Credential Management

Comments
2 min read
Docker Network Security: Binding Your AI Wallet to 127.0.0.1:3100
Cover image for Docker Network Security: Binding Your AI Wallet to 127.0.0.1:3100

Docker Network Security: Binding Your AI Wallet to 127.0.0.1:3100

Comments
5 min read
April 2026 Threat Roundup: Chrome RCE, Supply Chain Targeting & Satellite Infrastructure
Cover image for April 2026 Threat Roundup: Chrome RCE, Supply Chain Targeting & Satellite Infrastructure

April 2026 Threat Roundup: Chrome RCE, Supply Chain Targeting & Satellite Infrastructure

Comments
6 min read
Stuxnet: How a USB Drive Destroyed 1,000 Nuclear Centrifuges — A Technical Deep Dive

Stuxnet: How a USB Drive Destroyed 1,000 Nuclear Centrifuges — A Technical Deep Dive

Comments
4 min read
Everyone Talks About How to Build Secure Auth. Nobody Talks About What to Watch After You Ship It.
Cover image for Everyone Talks About How to Build Secure Auth. Nobody Talks About What to Watch After You Ship It.

Everyone Talks About How to Build Secure Auth. Nobody Talks About What to Watch After You Ship It.

6
Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.