Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program

Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program

Comments
4 min read
The Dual-Signal Governor: A Control-Plane Pattern for Drift-Aware Systems
Cover image for The Dual-Signal Governor: A Control-Plane Pattern for Drift-Aware Systems

The Dual-Signal Governor: A Control-Plane Pattern for Drift-Aware Systems

1
Comments
4 min read
Case Study: How I Removed Regenerating WordPress Malware Disguised as “System-Control”

Case Study: How I Removed Regenerating WordPress Malware Disguised as “System-Control”

Comments
7 min read
ShadowStrike Phantom: Open-Source EDR Platform

ShadowStrike Phantom: Open-Source EDR Platform

Comments
1 min read
The Stranger's Handshake

The Stranger's Handshake

Comments
7 min read
How I Audited My Infra After the LiteLLM Supply Chain Attack (And What I'm Doing Differently Now)
Cover image for How I Audited My Infra After the LiteLLM Supply Chain Attack (And What I'm Doing Differently Now)

How I Audited My Infra After the LiteLLM Supply Chain Attack (And What I'm Doing Differently Now)

Comments
7 min read
5 Cybersecurity Mistakes I Made as a CS Student (And How You Can Avoid Them)

5 Cybersecurity Mistakes I Made as a CS Student (And How You Can Avoid Them)

Comments
2 min read
The Genie Out of the Bottle / A.I.laddin's Lamp
Cover image for The Genie Out of the Bottle / A.I.laddin's Lamp

The Genie Out of the Bottle / A.I.laddin's Lamp

Comments
7 min read
What is VPN?

What is VPN?

Comments
2 min read
Cloud Supply Chain & AWS CodeBuild PrivEsc Exposed; GDDR6 Rowhammer to Root Shell

Cloud Supply Chain & AWS CodeBuild PrivEsc Exposed; GDDR6 Rowhammer to Root Shell

Comments
3 min read
The Developer’s Guide to JWT Storage
Cover image for The Developer’s Guide to JWT Storage

The Developer’s Guide to JWT Storage

5
Comments
14 min read
The Axios Supply Chain Attack Explained — npm's Biggest Security Breach in 2026

The Axios Supply Chain Attack Explained — npm's Biggest Security Breach in 2026

Comments
16 min read
FastAPI Security 100 LVL: Production-Grade DDoS Protection
Cover image for FastAPI Security 100 LVL: Production-Grade DDoS Protection

FastAPI Security 100 LVL: Production-Grade DDoS Protection

5
Comments
20 min read
Building a Real-Time Attack Detection Daemon

Building a Real-Time Attack Detection Daemon

Comments
5 min read
Why macOS Privacy Settings Lie to You (and How to Actually Audit Them)
Cover image for Why macOS Privacy Settings Lie to You (and How to Actually Audit Them)

Why macOS Privacy Settings Lie to You (and How to Actually Audit Them)

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.