Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Introducing Tunnel Whisperer: Surgical Connectivity for Networks That Say "No"
Cover image for Introducing Tunnel Whisperer: Surgical Connectivity for Networks That Say "No"

Introducing Tunnel Whisperer: Surgical Connectivity for Networks That Say "No"

6
Comments
6 min read
I'm a Junior Dev. I Used Vocalite for My Last 4 Technical Interviews.
Cover image for I'm a Junior Dev. I Used Vocalite for My Last 4 Technical Interviews.

I'm a Junior Dev. I Used Vocalite for My Last 4 Technical Interviews.

Comments
5 min read
I Built a Blockchain Voting System with RSA Encryption — Here's How It Works

I Built a Blockchain Voting System with RSA Encryption — Here's How It Works

Comments
4 min read
FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs
Cover image for FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs

FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs

Comments
5 min read
DOM XSS: Why Server-Side Sanitization Isn't Enough

DOM XSS: Why Server-Side Sanitization Isn't Enough

Comments
5 min read
I Built a Security Header Auditor in ~100 Lines of Node.js

I Built a Security Header Auditor in ~100 Lines of Node.js

Comments
6 min read
Your RAG Pipeline is Leaking - 4 Data Leak Points Nobody Talks About

Your RAG Pipeline is Leaking - 4 Data Leak Points Nobody Talks About

Comments
3 min read
How I Built a Local AI Docker Vulnerability Scanner (No API Costs, No Cloud)

How I Built a Local AI Docker Vulnerability Scanner (No API Costs, No Cloud)

1
Comments
3 min read
A 2018 Access Key. Still Active in Production. Here's the Python Script That Found It Across an Entire AWS Organization.
Cover image for A 2018 Access Key. Still Active in Production. Here's the Python Script That Found It Across an Entire AWS Organization.

A 2018 Access Key. Still Active in Production. Here's the Python Script That Found It Across an Entire AWS Organization.

1
Comments
7 min read
What I Found Scanning 30 Open-Source Repositories for CI/CD Identity Risks

What I Found Scanning 30 Open-Source Repositories for CI/CD Identity Risks

Comments
3 min read
Mastercard Just Validated the Standard We Built: Verifiable Agent Actions with AAR

Mastercard Just Validated the Standard We Built: Verifiable Agent Actions with AAR

Comments
3 min read
Enterprise AI Security: 12 Best Practices for Deploying LLMs in Production
Cover image for Enterprise AI Security: 12 Best Practices for Deploying LLMs in Production

Enterprise AI Security: 12 Best Practices for Deploying LLMs in Production

Comments
13 min read
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)

How I Made My First $300 Bug Bounty (Without Finding SQL Injection)

Comments
6 min read
Understanding ERC-4337: Account Abstraction Without Protocol Changes

Understanding ERC-4337: Account Abstraction Without Protocol Changes

1
Comments
4 min read
Modern password policy 2026: stop Password@1

Modern password policy 2026: stop Password@1

2
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.