Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-1778: The Global Unverify: How One Line of Python Broke SageMaker TLS

CVE-2026-1778: The Global Unverify: How One Line of Python Broke SageMaker TLS

Comments
2 min read
AWS Network Firewall blocked 0.59% of exploits in independent testing - what this means for your cloud

AWS Network Firewall blocked 0.59% of exploits in independent testing - what this means for your cloud

1
Comments
11 min read
How Web Applications Fail: An OWASP Top 10 Analysis Using Laravel and WordPress

How Web Applications Fail: An OWASP Top 10 Analysis Using Laravel and WordPress

Comments
3 min read
A Spammer Gave Me the Perfect Test Suite for My Content Classifier

A Spammer Gave Me the Perfect Test Suite for My Content Classifier

3
Comments
3 min read
RoguePilot: How a Simple GitHub Issue Can Steal Your Copilot Session

RoguePilot: How a Simple GitHub Issue Can Steal Your Copilot Session

1
Comments
8 min read
Building a Faster secp256k1 Library – UltrafastSecp256k1 v3.21

Building a Faster secp256k1 Library – UltrafastSecp256k1 v3.21

2
Comments
1 min read
We built a test corpus for AI agent egress security tools

We built a test corpus for AI agent egress security tools

1
Comments 1
3 min read
My AI Agent Auto-Approved Its Own Decision. Then Another Agent Executed It. No Human in the Loop.

My AI Agent Auto-Approved Its Own Decision. Then Another Agent Executed It. No Human in the Loop.

Comments 2
5 min read
Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️
Cover image for Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️

Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️

Comments
3 min read
MIME Sniffing — the API issue nobody notices until it bites

MIME Sniffing — the API issue nobody notices until it bites

1
Comments
1 min read
PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

4
Comments
3 min read
The Overlooked Attack Surface in Enterprise RAG Systems
Cover image for The Overlooked Attack Surface in Enterprise RAG Systems

The Overlooked Attack Surface in Enterprise RAG Systems

Comments
2 min read
🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

1
Comments
3 min read
Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

2
Comments
5 min read
The Cybersecurity Ego Taxonomy
Cover image for The Cybersecurity Ego Taxonomy

The Cybersecurity Ego Taxonomy

19
Comments 4
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.