Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

Comments
3 min read
Reverse Engineering Norwegian Grocery Apps

Reverse Engineering Norwegian Grocery Apps

Comments
7 min read
If It's Free, You're the Product: Investigating Spenderlog

If It's Free, You're the Product: Investigating Spenderlog

Comments
18 min read
Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Comments
5 min read
A French Sailor Went for a Jog. Journalists Found the Aircraft Carrier.
Cover image for A French Sailor Went for a Jog. Journalists Found the Aircraft Carrier.

A French Sailor Went for a Jog. Journalists Found the Aircraft Carrier.

1
Comments 1
2 min read
CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

Comments
2 min read
ERC-3525 Meets Reentrancy: How a Token Standard Interaction Turned 135 Tokens Into 567 Million in the Solv Protocol Exploit

ERC-3525 Meets Reentrancy: How a Token Standard Interaction Turned 135 Tokens Into 567 Million in the Solv Protocol Exploit

2
Comments
5 min read
SaaS Multi-Tenant en Go: Guia Practica de Row-Level Security en PostgreSQL
Cover image for SaaS Multi-Tenant en Go: Guia Practica de Row-Level Security en PostgreSQL

SaaS Multi-Tenant en Go: Guia Practica de Row-Level Security en PostgreSQL

3
Comments
10 min read
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims
Cover image for Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

5
Comments
7 min read
| Digital Genie Cybersecurity

| Digital Genie Cybersecurity

Comments
4 min read
Implementing BLE Security on ESP32: LE Secure Connections the Hard Way

Implementing BLE Security on ESP32: LE Secure Connections the Hard Way

Comments
5 min read
Understanding Microsoft Entra Agent ID
Cover image for Understanding Microsoft Entra Agent ID

Understanding Microsoft Entra Agent ID

3
Comments 3
6 min read
WAF Checker — Guess what? Someone is actually using it!

WAF Checker — Guess what? Someone is actually using it!

Comments
1 min read
Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App
Cover image for Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App

Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App

Comments
8 min read
What Your IP Address Actually Reveals (A Developer's Perspective)
Cover image for What Your IP Address Actually Reveals (A Developer's Perspective)

What Your IP Address Actually Reveals (A Developer's Perspective)

2
Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.