Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
When Security Failures Become Legal Liabilities: Mapping OWASP Top 10 to GDPR and DPDP
Cover image for When Security Failures Become Legal Liabilities: Mapping OWASP Top 10 to GDPR and DPDP

When Security Failures Become Legal Liabilities: Mapping OWASP Top 10 to GDPR and DPDP

Comments
7 min read
Detecting fabricated tweet IDs from LLM agents: a snowflake-decode field guide

Detecting fabricated tweet IDs from LLM agents: a snowflake-decode field guide

Comments
5 min read
Week 18: JWT, Security, and Breaking My Own Auth System

Week 18: JWT, Security, and Breaking My Own Auth System

2
Comments
4 min read
AAEF v0.6.0: Practical Adoption Readiness Planning Release

AAEF v0.6.0: Practical Adoption Readiness Planning Release

Comments
1 min read
Shift-Left Security: Catch CVEs Before They Catch You!

Shift-Left Security: Catch CVEs Before They Catch You!

Comments 1
3 min read
Reverse Engineering rpcss.dll: Hunting for the ROT's Hidden Structure

Reverse Engineering rpcss.dll: Hunting for the ROT's Hidden Structure

Comments
4 min read
The Identity Crisis How blockchain improves your life
Cover image for The Identity Crisis How blockchain improves your life

The Identity Crisis How blockchain improves your life

Comments
2 min read
How to decode and debug a JWT without installing anything

How to decode and debug a JWT without installing anything

Comments
5 min read
npm installs packages blindly — I built a CLI to fix that

npm installs packages blindly — I built a CLI to fix that

Comments
1 min read
Payment Rails Are Shipping. Trust Rails Aren't. That's the Problem.

Payment Rails Are Shipping. Trust Rails Aren't. That's the Problem.

Comments
2 min read
NIST NCCoE AI Agent Identity & Authorization: What Developers Need to Build

NIST NCCoE AI Agent Identity & Authorization: What Developers Need to Build

Comments
8 min read
Building an ELF Binary analyzer in Python (Phase 3: section listing)
Cover image for Building an ELF Binary analyzer in Python (Phase 3: section listing)

Building an ELF Binary analyzer in Python (Phase 3: section listing)

Comments
2 min read
I built a service that will never expose your raw API keys ever again

I built a service that will never expose your raw API keys ever again

Comments
2 min read
How Broken Access Control Became OWASP's Top Security Risk

How Broken Access Control Became OWASP's Top Security Risk

Comments
5 min read
Authentication vs Authorization: What's the Difference?

Authentication vs Authorization: What's the Difference?

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.