Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Don't Trust the Client: How I Hacked My Own Coupon System

Don't Trust the Client: How I Hacked My Own Coupon System

Comments
2 min read
Why cookies are unreliable for identifying users

Why cookies are unreliable for identifying users

Comments
2 min read
I built a free npm/PyPI supply chain scanner - looking for testers
Cover image for I built a free npm/PyPI supply chain scanner - looking for testers

I built a free npm/PyPI supply chain scanner - looking for testers

7
Comments 1
4 min read
Data Security in Salesforce: Understanding the Layers That Protect Your Data
Cover image for Data Security in Salesforce: Understanding the Layers That Protect Your Data

Data Security in Salesforce: Understanding the Layers That Protect Your Data

Comments
8 min read
Why Rust?

Why Rust?

1
Comments
3 min read
Beyond Firewalls: How AWS WAF Becomes Your First Line of Cloud Defense

Beyond Firewalls: How AWS WAF Becomes Your First Line of Cloud Defense

2
Comments
4 min read
Web Application Security & XSS Mitigation Lab

Web Application Security & XSS Mitigation Lab

Comments
1 min read
Securing Claude Code with Pipelock

Securing Claude Code with Pipelock

5
Comments
4 min read
WireGuard no TP-Link Omada ER605: O Guia para criar VPN

WireGuard no TP-Link Omada ER605: O Guia para criar VPN

Comments
2 min read
Bloom: Anthropic’s Tool That Changes How We Evaluate AI Safety

Bloom: Anthropic’s Tool That Changes How We Evaluate AI Safety

Comments
7 min read
HTTP vs HTTPS: Understanding Website Security (Beginner-Friendly Guide)
Cover image for HTTP vs HTTPS: Understanding Website Security (Beginner-Friendly Guide)

HTTP vs HTTPS: Understanding Website Security (Beginner-Friendly Guide)

Comments
2 min read
Why Detection Lost: Building Cryptographic Provenance for the Synthetic Media Crisis
Cover image for Why Detection Lost: Building Cryptographic Provenance for the Synthetic Media Crisis

Why Detection Lost: Building Cryptographic Provenance for the Synthetic Media Crisis

Comments
10 min read
Your MCP agents have no guardrails. Here's how to fix that.
Cover image for Your MCP agents have no guardrails. Here's how to fix that.

Your MCP agents have no guardrails. Here's how to fix that.

Comments
2 min read
Your MCP agents have no guardrails. Here's how to fix that.
Cover image for Your MCP agents have no guardrails. Here's how to fix that.

Your MCP agents have no guardrails. Here's how to fix that.

Comments
2 min read
How Companies Scan Their Own Networks: A Practical Red Team View with Nmap
Cover image for How Companies Scan Their Own Networks: A Practical Red Team View with Nmap

How Companies Scan Their Own Networks: A Practical Red Team View with Nmap

2
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.