Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Home SOC Lab

Building a Home SOC Lab

Comments
2 min read
Week 2 Scripting Challenge: Log Parser
Cover image for Week 2 Scripting Challenge: Log Parser

Week 2 Scripting Challenge: Log Parser

2
Comments
12 min read
Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research
Cover image for Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research

Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research

Comments
2 min read
Hacking Ético

Hacking Ético

Comments
1 min read
How to Prevent Objects from Being Modified in JavaScript
Cover image for How to Prevent Objects from Being Modified in JavaScript

How to Prevent Objects from Being Modified in JavaScript

Comments
2 min read
What breaks trust in authentication UX

What breaks trust in authentication UX

4
Comments 1
3 min read
Critical Security Vulnerability Found in React Server Components (RSC)

Critical Security Vulnerability Found in React Server Components (RSC)

2
Comments 1
1 min read
Implementing Authentication Middleware in Next.js with i18n Support
Cover image for Implementing Authentication Middleware in Next.js with i18n Support

Implementing Authentication Middleware in Next.js with i18n Support

Comments
3 min read
Support is the weakest link in authentication (unless you design it not to be)
Cover image for Support is the weakest link in authentication (unless you design it not to be)

Support is the weakest link in authentication (unless you design it not to be)

5
Comments 6
3 min read
SENTINEL: The Only Production-Ready Open-Source AI Security Gateway (170 Engines)

SENTINEL: The Only Production-Ready Open-Source AI Security Gateway (170 Engines)

Comments
2 min read
Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

2
Comments
17 min read
Machine Learning vs. Cyber Threats: A Smarter Defense
Cover image for Machine Learning vs. Cyber Threats: A Smarter Defense

Machine Learning vs. Cyber Threats: A Smarter Defense

Comments 3
6 min read
Day 5 — Environment Drift (The Fog in the Valley)
Cover image for Day 5 — Environment Drift (The Fog in the Valley)

Day 5 — Environment Drift (The Fog in the Valley)

8
Comments
2 min read
Christmas Gift: Open-Sourcing 99 AI Security Detection Engines

Christmas Gift: Open-Sourcing 99 AI Security Detection Engines

Comments 2
2 min read
Amazon EKS adds native support for the AWS Secrets Store CSI Driver Provider

Amazon EKS adds native support for the AWS Secrets Store CSI Driver Provider

Comments
1 min read
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

1
Comments
7 min read
Week 2 Scripting Challenge: Caesarian Cipher

Week 2 Scripting Challenge: Caesarian Cipher

Comments
6 min read
How to Move Vital Records from the Filing Cabinet to a Secure Digital Vault
Cover image for How to Move Vital Records from the Filing Cabinet to a Secure Digital Vault

How to Move Vital Records from the Filing Cabinet to a Secure Digital Vault

Comments
2 min read
Key Take-a-Ways From Microsoft Ignite 2025

Key Take-a-Ways From Microsoft Ignite 2025

Comments
4 min read
FaithTech Is Not an App Category — It’s an Infrastructure Problem

FaithTech Is Not an App Category — It’s an Infrastructure Problem

Comments
2 min read
Goodbye to Static Credentials: Embrace Modern Identity Practices
Cover image for Goodbye to Static Credentials: Embrace Modern Identity Practices

Goodbye to Static Credentials: Embrace Modern Identity Practices

2
Comments
5 min read
Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)
Cover image for Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Comments
2 min read
Secure Identity and Access Management with AWS IAM

Secure Identity and Access Management with AWS IAM

3
Comments
4 min read
Securely Triggering a Private Jenkins Using GitHub Webhooks, API Gateway (Public), and Lambda (Private)

Securely Triggering a Private Jenkins Using GitHub Webhooks, API Gateway (Public), and Lambda (Private)

Comments
5 min read
Who’s Got the Keys to Your Data? PIM’s Here to Play Bouncer!

Who’s Got the Keys to Your Data? PIM’s Here to Play Bouncer!

Comments
3 min read
loading...