Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Reviewed My Own Code Like I Was Trying to Break It
Cover image for I Reviewed My Own Code Like I Was Trying to Break It

I Reviewed My Own Code Like I Was Trying to Break It

1
Comments
6 min read
Humans Can’t Post Here… Only AI Agents (Moltbook Explained)

Humans Can’t Post Here… Only AI Agents (Moltbook Explained)

1
Comments
1 min read
When Your npm Install Becomes an AI Agent Attack: The MCP Supply Chain Threat

When Your npm Install Becomes an AI Agent Attack: The MCP Supply Chain Threat

4
Comments
7 min read
Automated Vulnerability Scanning for AWS Lambda with Amazon Inspector
Cover image for Automated Vulnerability Scanning for AWS Lambda with Amazon Inspector

Automated Vulnerability Scanning for AWS Lambda with Amazon Inspector

Comments
1 min read
Building a Deterministic Password CLI in Go with Argon2id

Building a Deterministic Password CLI in Go with Argon2id

1
Comments
4 min read
RFC 7521 Deep Dive: Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
Cover image for RFC 7521 Deep Dive: Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants

RFC 7521 Deep Dive: Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants

2
Comments
8 min read
Browser Fingerprinting Explained: How Websites Track You Without Cookies
Cover image for Browser Fingerprinting Explained: How Websites Track You Without Cookies

Browser Fingerprinting Explained: How Websites Track You Without Cookies

Comments
8 min read
Your AI Guardrails Fail the Kerckhoffs Test

Your AI Guardrails Fail the Kerckhoffs Test

2
Comments
6 min read
AI-Generated Code Is Quietly Poisoning Your Dependency Tree
Cover image for AI-Generated Code Is Quietly Poisoning Your Dependency Tree

AI-Generated Code Is Quietly Poisoning Your Dependency Tree

5
Comments 4
4 min read
Post-Quantum Cryptography: A Practical Guide for IT Leaders

Post-Quantum Cryptography: A Practical Guide for IT Leaders

2
Comments 2
8 min read
A Developer’s Guide to Detecting AI-Generated Images

A Developer’s Guide to Detecting AI-Generated Images

Comments
3 min read
DevSecOps Without the Pain: The Missing Piece Most Teams Overlook
Cover image for DevSecOps Without the Pain: The Missing Piece Most Teams Overlook

DevSecOps Without the Pain: The Missing Piece Most Teams Overlook

Comments
4 min read
SAST vs DAST vs (IAST/RASP): Quick AppSec Checklist
Cover image for SAST vs DAST vs (IAST/RASP): Quick AppSec Checklist

SAST vs DAST vs (IAST/RASP): Quick AppSec Checklist

6
Comments 3
1 min read
Stop Blaming AWS Defaults for Your Misconfigurations
Cover image for Stop Blaming AWS Defaults for Your Misconfigurations

Stop Blaming AWS Defaults for Your Misconfigurations

2
Comments
4 min read
Rage GBA Engine on macOS: When Gatekeeper Silently Kills the Launch

Rage GBA Engine on macOS: When Gatekeeper Silently Kills the Launch

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.