Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-34247: CVE-2026-34247: Insecure Direct Object Reference and Information Disclosure in WWBN AVideo

CVE-2026-34247: CVE-2026-34247: Insecure Direct Object Reference and Information Disclosure in WWBN AVideo

Comments
2 min read
We Scanned 16 AI Agent Repos. 76% of Tool Calls Had Zero Guards.

We Scanned 16 AI Agent Repos. 76% of Tool Calls Had Zero Guards.

Comments
6 min read
The Mistakes Didn't Change. The Speed Did.
Cover image for The Mistakes Didn't Change. The Speed Did.

The Mistakes Didn't Change. The Speed Did.

Comments
3 min read
GHSA-H8R8-WCCR-V5F2: GHSA-H8R8-WCCR-V5F2: Mutation-XSS via Re-Contextualization in DOMPurify

GHSA-H8R8-WCCR-V5F2: GHSA-H8R8-WCCR-V5F2: Mutation-XSS via Re-Contextualization in DOMPurify

Comments
2 min read
InformationWeek Says Control AI Agent Costs With Process. Here's Why That Won't Scale.

InformationWeek Says Control AI Agent Costs With Process. Here's Why That Won't Scale.

Comments
7 min read
The UK Government Just Called Vibe Coding Security Risks 'Intolerable'

The UK Government Just Called Vibe Coding Security Risks 'Intolerable'

Comments
3 min read
I built a pre-push git hook that catches leaked secrets before they hit GitHub

I built a pre-push git hook that catches leaked secrets before they hit GitHub

Comments
3 min read
Reducing False Positives: Addressing Non-Exploitable CVEs in Hardened Kubernetes Environments with Vulnerability Scanners

Reducing False Positives: Addressing Non-Exploitable CVEs in Hardened Kubernetes Environments with Vulnerability Scanners

Comments
7 min read
Penetration Testing Basics for Developers

Penetration Testing Basics for Developers

Comments
8 min read
Solving AI Agent Auth: Why Your Bots Need Real Identities

Solving AI Agent Auth: Why Your Bots Need Real Identities

Comments
5 min read
The Math Behind RSA #4: Breaking RSA and the Rise of Elliptic Curve Cryptography

The Math Behind RSA #4: Breaking RSA and the Rise of Elliptic Curve Cryptography

Comments
8 min read
ISO 27001 Just Got the Same Treatment as SOC2

ISO 27001 Just Got the Same Treatment as SOC2

Comments
3 min read
Husband's Loan Application Triggers Security Incident: Third-Party Payroll Access Raises Employer Concerns

Husband's Loan Application Triggers Security Incident: Third-Party Payroll Access Raises Employer Concerns

Comments
7 min read
The AI Audit Pipeline: How ItyFuzz, Certora AI Composer, and Medusa ML Are Making Manual Invariant Discovery Obsolete

The AI Audit Pipeline: How ItyFuzz, Certora AI Composer, and Medusa ML Are Making Manual Invariant Discovery Obsolete

Comments
6 min read
Wednesday Links - Edition 2026-04-01

Wednesday Links - Edition 2026-04-01

1
Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.