Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
My AI Agent Auto-Approved Its Own Decision. Then Another Agent Executed It. No Human in the Loop.

My AI Agent Auto-Approved Its Own Decision. Then Another Agent Executed It. No Human in the Loop.

Comments 2
5 min read
Running AI Agents Safely with Firecracker MicroVMs (Introducing BunkerVM)
Cover image for Running AI Agents Safely with Firecracker MicroVMs (Introducing BunkerVM)

Running AI Agents Safely with Firecracker MicroVMs (Introducing BunkerVM)

3
Comments
2 min read
Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️
Cover image for Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️

Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️

Comments
3 min read
MIME Sniffing — the API issue nobody notices until it bites

MIME Sniffing — the API issue nobody notices until it bites

1
Comments
1 min read
The DeFi Security Playbook: What Top Protocols Do Differently in 2026

The DeFi Security Playbook: What Top Protocols Do Differently in 2026

Comments
5 min read
PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

4
Comments
3 min read
The Overlooked Attack Surface in Enterprise RAG Systems
Cover image for The Overlooked Attack Surface in Enterprise RAG Systems

The Overlooked Attack Surface in Enterprise RAG Systems

Comments
2 min read
TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

Comments 1
3 min read
🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

1
Comments
3 min read
Stop Hashing Passwords: A Practical Step-by-Step Passkey Tutorial

Stop Hashing Passwords: A Practical Step-by-Step Passkey Tutorial

Comments
10 min read
Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

2
Comments
5 min read
Security news weekly round-up - 6th February 2026
Cover image for Security news weekly round-up - 6th February 2026

Security news weekly round-up - 6th February 2026

1
Comments
3 min read
Securing Serverless Apps: Migrating from Env Vars to AWS SSM Parameter Store
Cover image for Securing Serverless Apps: Migrating from Env Vars to AWS SSM Parameter Store

Securing Serverless Apps: Migrating from Env Vars to AWS SSM Parameter Store

Comments
1 min read
Bridging the Cloud: A Step-by-Step Guide to Azure VNet-to-VNet VPNs

Bridging the Cloud: A Step-by-Step Guide to Azure VNet-to-VNet VPNs

1
Comments
3 min read
Designing a Secure and Scalable AWS Architecture: A Practical Guide

Designing a Secure and Scalable AWS Architecture: A Practical Guide

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.