Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Your Code with AWS Inspector: A Comprehensive Guide to Code Security Scanning

Securing Your Code with AWS Inspector: A Comprehensive Guide to Code Security Scanning

3
Comments
4 min read
Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall
Cover image for Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

Comments
3 min read
Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall
Cover image for Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Comments
3 min read
Security news weekly round-up - 8th August 2025
Cover image for Security news weekly round-up - 8th August 2025

Security news weekly round-up - 8th August 2025

1
Comments
4 min read
From a Single Container to a Secure Application Stack: A Practical Guide to Docker and Server Hardening

From a Single Container to a Secure Application Stack: A Practical Guide to Docker and Server Hardening

Comments
5 min read
Adversarial Attacks on Generative AI: A Growing Concern in the AI Era
Cover image for Adversarial Attacks on Generative AI: A Growing Concern in the AI Era

Adversarial Attacks on Generative AI: A Growing Concern in the AI Era

1
Comments
4 min read
Offensive security - Testing for Broken Access Control (OWASP)
Cover image for Offensive security - Testing for Broken Access Control (OWASP)

Offensive security - Testing for Broken Access Control (OWASP)

Comments
1 min read
Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)
Cover image for Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)

Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)

Comments
4 min read
Prompt Chainmail: Security middleware for AI applications
Cover image for Prompt Chainmail: Security middleware for AI applications

Prompt Chainmail: Security middleware for AI applications

1
Comments 3
4 min read
Recovering Locked S3 Buckets in AWS Organizations using AssumeRoot
Cover image for Recovering Locked S3 Buckets in AWS Organizations using AssumeRoot

Recovering Locked S3 Buckets in AWS Organizations using AssumeRoot

2
Comments
4 min read
Gateway-Oriented Architecture (GOA)

Gateway-Oriented Architecture (GOA)

Comments
3 min read
GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits
Cover image for GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

5
Comments
19 min read
Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews
Cover image for Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Comments
3 min read
Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Comments
1 min read
Logs Fundamentals for Cybersecurity: What Every Analyst Should Know
Cover image for Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Comments
10 min read
🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy
Cover image for 🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy

🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy

Comments
2 min read
Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch
Cover image for Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Comments
3 min read
RC4: From Ubiquity to Collapse — and What It Taught Us About Trust
Cover image for RC4: From Ubiquity to Collapse — and What It Taught Us About Trust

RC4: From Ubiquity to Collapse — and What It Taught Us About Trust

Comments
4 min read
Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

3
Comments 1
8 min read
Dev Diary #2: Cloud Security plugin for JetBrains IDE
Cover image for Dev Diary #2: Cloud Security plugin for JetBrains IDE

Dev Diary #2: Cloud Security plugin for JetBrains IDE

Comments
3 min read
Network Security Tips For Small Business

Network Security Tips For Small Business

Comments
4 min read
Revival Hijacking: How Deleted PyPI Packages Become Threats
Cover image for Revival Hijacking: How Deleted PyPI Packages Become Threats

Revival Hijacking: How Deleted PyPI Packages Become Threats

Comments
6 min read
Cloud Resume Challenge - Chunk 0 - Access, Credentials, and Certification Prep
Cover image for Cloud Resume Challenge - Chunk 0 - Access, Credentials, and Certification Prep

Cloud Resume Challenge - Chunk 0 - Access, Credentials, and Certification Prep

Comments
3 min read
How SSH Authentication Really Works

How SSH Authentication Really Works

6
Comments
3 min read
CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument
Cover image for CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

1
Comments
2 min read
loading...