Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 22nd August 2025
Cover image for Security news weekly round-up - 22nd August 2025

Security news weekly round-up - 22nd August 2025

Comments
3 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI
Cover image for Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

1
Comments
2 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI
Cover image for Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
What Are Non-Human Identities, and Why Should Security Teams Care?
Cover image for What Are Non-Human Identities, and Why Should Security Teams Care?

What Are Non-Human Identities, and Why Should Security Teams Care?

Comments
4 min read
ă‚“, and?

ă‚“, and?

4
Comments
4 min read
The Hidden Security Risk in Your NestJS App: A Validation Story
Cover image for The Hidden Security Risk in Your NestJS App: A Validation Story

The Hidden Security Risk in Your NestJS App: A Validation Story

1
Comments
3 min read
Built for AI. Ready for Crisis. Inside Israel’s Most Secure Data Center
Cover image for Built for AI. Ready for Crisis. Inside Israel’s Most Secure Data Center

Built for AI. Ready for Crisis. Inside Israel’s Most Secure Data Center

Comments
2 min read
How to check if your Supabase table is open to public

How to check if your Supabase table is open to public

1
Comments
3 min read
Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock
Cover image for Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

1
Comments 1
3 min read
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management
Cover image for The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

1
Comments
6 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI
Cover image for Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
Watch Out for These Slash-Like Unicode Characters in Phishing Links
Cover image for Watch Out for These Slash-Like Unicode Characters in Phishing Links

Watch Out for These Slash-Like Unicode Characters in Phishing Links

Comments
2 min read
HTB - Support - Windows (Easy)

HTB - Support - Windows (Easy)

1
Comments
1 min read
AI Scams in 2025: 7 Real Examples and How to Avoid Them

AI Scams in 2025: 7 Real Examples and How to Avoid Them

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.