Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How Vue Protects Your App Against Injections
Cover image for How Vue Protects Your App Against Injections

How Vue Protects Your App Against Injections

2
Comments
4 min read
I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

1
Comments
2 min read
Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency
Cover image for Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Comments
3 min read
SAST vs DAST vs SCA: What’s the Difference and When to Use Each
Cover image for SAST vs DAST vs SCA: What’s the Difference and When to Use Each

SAST vs DAST vs SCA: What’s the Difference and When to Use Each

Comments
4 min read
How to Detect Bot Traffic by IP Address (JavaScript)

How to Detect Bot Traffic by IP Address (JavaScript)

Comments
5 min read
How to Detect VPN and Proxy Users by IP Address (JavaScript)

How to Detect VPN and Proxy Users by IP Address (JavaScript)

1
Comments
5 min read
The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

Comments
6 min read
Incident Response, Business Continuity, and Disaster Recovery
Cover image for Incident Response, Business Continuity, and Disaster Recovery

Incident Response, Business Continuity, and Disaster Recovery

Comments
1 min read
Your Server's Public Key Is All I Need to Become Admin, CVE-2026-29000
Cover image for Your Server's Public Key Is All I Need to Become Admin, CVE-2026-29000

Your Server's Public Key Is All I Need to Become Admin, CVE-2026-29000

1
Comments
5 min read
GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

1
Comments
2 min read
How to Build a Phishing URL Scanner in JavaScript (Free APIs)

How to Build a Phishing URL Scanner in JavaScript (Free APIs)

Comments
5 min read
I built an eBPF-powered "Judge" that executes packets based on Shannon Entropy. Break my Realm.

I built an eBPF-powered "Judge" that executes packets based on Shannon Entropy. Break my Realm.

Comments
2 min read
Introducing Contextual Access: The Third Layer of AI Agent Security

Introducing Contextual Access: The Third Layer of AI Agent Security

Comments
8 min read
AWS IAM Explained Without Making Your Head Hurt

AWS IAM Explained Without Making Your Head Hurt

1
Comments
3 min read
Linux Permissions

Linux Permissions

2
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.