Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool
Cover image for Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Comments
5 min read
CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

Comments
2 min read
👻 EDR Evasion: Unhooking the Kernel
Cover image for 👻 EDR Evasion: Unhooking the Kernel

👻 EDR Evasion: Unhooking the Kernel

Comments
6 min read
Hello World — Independent Security Researcher Joining DEV
Cover image for Hello World — Independent Security Researcher Joining DEV

Hello World — Independent Security Researcher Joining DEV

Comments
1 min read
Secure by Design — Building Fortresses, Not Just Fixing Leaks

Secure by Design — Building Fortresses, Not Just Fixing Leaks

1
Comments
3 min read
Why PostgreSQL Row-Level Security Is the Right Approach to Django Multitenancy
Cover image for Why PostgreSQL Row-Level Security Is the Right Approach to Django Multitenancy

Why PostgreSQL Row-Level Security Is the Right Approach to Django Multitenancy

7
Comments 8
13 min read
Vector Database Leaks: Why Your AI Embeddings Are as Dangerous as Your Raw Data

Vector Database Leaks: Why Your AI Embeddings Are as Dangerous as Your Raw Data

Comments
10 min read
Operating in Prompt Space: Red Teaming the Control Plane of an LLM
Cover image for Operating in Prompt Space: Red Teaming the Control Plane of an LLM

Operating in Prompt Space: Red Teaming the Control Plane of an LLM

2
Comments
10 min read
Write Once, Read Many: How WORM Storage Makes Your Data Secure
Cover image for Write Once, Read Many: How WORM Storage Makes Your Data Secure

Write Once, Read Many: How WORM Storage Makes Your Data Secure

Comments
5 min read
GlassWorm's Solana C2: How a Supply-Chain Monster Turned the Blockchain Into a Dead Drop

GlassWorm's Solana C2: How a Supply-Chain Monster Turned the Blockchain Into a Dead Drop

2
Comments
6 min read
Linux File Permissions (chmod): The Complete Developer Guide

Linux File Permissions (chmod): The Complete Developer Guide

2
Comments
2 min read
OpenClaw vs NemoClaw vs NanoClaw: AI Agent Platform Security Comparison

OpenClaw vs NemoClaw vs NanoClaw: AI Agent Platform Security Comparison

2
Comments 1
4 min read
Vector Database Security Risk Assessment: Enterprise Framework

Vector Database Security Risk Assessment: Enterprise Framework

Comments
4 min read
MPP Solves How Agents Pay. It Doesn't Solve Who Authorized It.

MPP Solves How Agents Pay. It Doesn't Solve Who Authorized It.

1
Comments
5 min read
Taking the KCSA Exam on My Washing Machine (And Passing!)
Cover image for Taking the KCSA Exam on My Washing Machine (And Passing!)

Taking the KCSA Exam on My Washing Machine (And Passing!)

3
Comments 1
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.