Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
HackTheBox Sherlock Brutus Writeup

HackTheBox Sherlock Brutus Writeup

Comments
17 min read
The Hidden Attack Surface of AI Agents: Why Agent Security is the Next Big Thing

The Hidden Attack Surface of AI Agents: Why Agent Security is the Next Big Thing

Comments
4 min read
Automate Website Security Audits with Technology Detection in Python

Automate Website Security Audits with Technology Detection in Python

Comments
5 min read
Building a Living Firewall: A Vaccine Model for Cybersecurity

Building a Living Firewall: A Vaccine Model for Cybersecurity

Comments
2 min read
Running DNS Is Easy. Trusting It Is Not.
Cover image for Running DNS Is Easy. Trusting It Is Not.

Running DNS Is Easy. Trusting It Is Not.

Comments
4 min read
The Day My Linux Server Started Distributing Windows Malware
Cover image for The Day My Linux Server Started Distributing Windows Malware

The Day My Linux Server Started Distributing Windows Malware

Comments
4 min read
ArkForge proof format: an open spec for certifying any HTTP transaction
Cover image for ArkForge proof format: an open spec for certifying any HTTP transaction

ArkForge proof format: an open spec for certifying any HTTP transaction

Comments
3 min read
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers

Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers

Comments
5 min read
The Developer's Guide to 'Safe Share'
Cover image for The Developer's Guide to 'Safe Share'

The Developer's Guide to 'Safe Share'

4
Comments
1 min read
From Leaky Container to Fort Knox: A Guide to Docker Security Hardening

From Leaky Container to Fort Knox: A Guide to Docker Security Hardening

1
Comments
2 min read
Building AI for Government: What Developers Need to Know
Cover image for Building AI for Government: What Developers Need to Know

Building AI for Government: What Developers Need to Know

Comments
6 min read
Your MCP server's tool descriptions are an attack surface

Your MCP server's tool descriptions are an attack surface

11
Comments 25
6 min read
SSTI Explained: HTB Hacknet Writeup
Cover image for SSTI Explained: HTB Hacknet Writeup

SSTI Explained: HTB Hacknet Writeup

Comments
4 min read
Java Security

Java Security

3
Comments
14 min read
Securing Test Environments: How a DevOps Expert Eliminated PII Leaks with Node.js Under Tight Deadlines

Securing Test Environments: How a DevOps Expert Eliminated PII Leaks with Node.js Under Tight Deadlines

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.