Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors
Cover image for QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

6
Comments 2
2 min read
I Gave My AI Agent a Brain. Then I Had to Protect It.
Cover image for I Gave My AI Agent a Brain. Then I Had to Protect It.

I Gave My AI Agent a Brain. Then I Had to Protect It.

2
Comments 1
5 min read
I Just Wanted a Login Form: The "Swamp" of Complexity in the Modern Auth Ecosystem
Cover image for I Just Wanted a Login Form: The "Swamp" of Complexity in the Modern Auth Ecosystem

I Just Wanted a Login Form: The "Swamp" of Complexity in the Modern Auth Ecosystem

3
Comments 1
2 min read
How to Manage API Keys in Multi-Service Projects Without Breaking Production

How to Manage API Keys in Multi-Service Projects Without Breaking Production

Comments
3 min read
Pre-Action Authorization: The Missing Security Layer for AI Agents

Pre-Action Authorization: The Missing Security Layer for AI Agents

Comments 1
4 min read
I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

Comments
1 min read
GitHub Copilot Security Review: It Executes Malware With Zero Approval
Cover image for GitHub Copilot Security Review: It Executes Malware With Zero Approval

GitHub Copilot Security Review: It Executes Malware With Zero Approval

14
Comments 6
4 min read
From Cloud Engineer to Architect: Building the Right Skill Stack
Cover image for From Cloud Engineer to Architect: Building the Right Skill Stack

From Cloud Engineer to Architect: Building the Right Skill Stack

2
Comments 1
7 min read
We got tired of users asking "is this file legit?" so we built a verification system

We got tired of users asking "is this file legit?" so we built a verification system

Comments
2 min read
Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud
Cover image for Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Comments
14 min read
Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Comments
2 min read
You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained
Cover image for You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

Comments
10 min read
Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide
Cover image for Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Comments
9 min read
30 CVEs and Counting: The MCP Security Crisis Nobody's Talking About

30 CVEs and Counting: The MCP Security Crisis Nobody's Talking About

Comments 1
6 min read
Modular Isolation Architecture (MIA)
Cover image for Modular Isolation Architecture (MIA)

Modular Isolation Architecture (MIA)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.