Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity

Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity

1
Comments
8 min read
The Challenge of Large File Checksums

The Challenge of Large File Checksums

Comments
3 min read
Preventing AI Project Failures Through Effective Prompt Engineering

Preventing AI Project Failures Through Effective Prompt Engineering

1
Comments
5 min read
Hacking Mongoose: How I Built a Global Plugin to Stop Data Leaks 🛡️
Cover image for Hacking Mongoose: How I Built a Global Plugin to Stop Data Leaks 🛡️

Hacking Mongoose: How I Built a Global Plugin to Stop Data Leaks 🛡️

3
Comments 4
3 min read
Snoop On Your Local Network with tcpdump

Snoop On Your Local Network with tcpdump

Comments
4 min read
Pin It or Bin It (for the brewsters)

Pin It or Bin It (for the brewsters)

Comments
2 min read
Role vs Permission: Why Your RBAC Shouldn't Use Role Checks

Role vs Permission: Why Your RBAC Shouldn't Use Role Checks

1
Comments
4 min read
Firebase Security Is Broken. Here's the Tool I Built to Fix It.
Cover image for Firebase Security Is Broken. Here's the Tool I Built to Fix It.

Firebase Security Is Broken. Here's the Tool I Built to Fix It.

2
Comments
2 min read
I Let Attackers Train My AI-powered Security Proxy (Here’s What Happened)
Cover image for I Let Attackers Train My AI-powered Security Proxy (Here’s What Happened)

I Let Attackers Train My AI-powered Security Proxy (Here’s What Happened)

Comments 2
3 min read
Critical AI Infrastructure Security Threat: Reproducing and Detecting the NVIDIA Triton Critical Vulnerability(CVE-2025-23316)

Critical AI Infrastructure Security Threat: Reproducing and Detecting the NVIDIA Triton Critical Vulnerability(CVE-2025-23316)

1
Comments
4 min read
Top 5 Audit Logging Libraries Every Startup Should Consider in 2025

Top 5 Audit Logging Libraries Every Startup Should Consider in 2025

Comments
2 min read
When Your Country's Currency Loses 70% in Two Years, Bitcoin Stops Looking Risky
Cover image for When Your Country's Currency Loses 70% in Two Years, Bitcoin Stops Looking Risky

When Your Country's Currency Loses 70% in Two Years, Bitcoin Stops Looking Risky

6
Comments 2
7 min read
LLM Prompt Engineering: A Practical Guide to Not Getting Hacked
Cover image for LLM Prompt Engineering: A Practical Guide to Not Getting Hacked

LLM Prompt Engineering: A Practical Guide to Not Getting Hacked

1
Comments
7 min read
Mastering Climbing Protection: A Beginner’s Guide to Safe Ascents by Avid enthusiasts Cesar Alcantara
Cover image for Mastering Climbing Protection: A Beginner’s Guide to Safe Ascents by Avid enthusiasts Cesar Alcantara

Mastering Climbing Protection: A Beginner’s Guide to Safe Ascents by Avid enthusiasts Cesar Alcantara

Comments
4 min read
OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)
Cover image for OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)

OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)

Comments
51 min read
Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)
Cover image for Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)

Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)

1
Comments
1 min read
6 Top WordPress Security Plugins to Use in 2026
Cover image for 6 Top WordPress Security Plugins to Use in 2026

6 Top WordPress Security Plugins to Use in 2026

2
Comments 2
5 min read
How to Secure Secrets with SOPS, KMS, and Pipeline Gates
Cover image for How to Secure Secrets with SOPS, KMS, and Pipeline Gates

How to Secure Secrets with SOPS, KMS, and Pipeline Gates

Comments
2 min read
Wildbox: all-in-one open security platform
Cover image for Wildbox: all-in-one open security platform

Wildbox: all-in-one open security platform

Comments
1 min read
TUF: A Terminal UI for UFW Enhancing Firewall Management

TUF: A Terminal UI for UFW Enhancing Firewall Management

Comments
1 min read
The Poetic Hack: Exploiting LLMs with Verse by Arvind Sundararajan

The Poetic Hack: Exploiting LLMs with Verse by Arvind Sundararajan

Comments
2 min read
🕵️‍♀️ Nmap & Scapy on Kali: A Beginner-Friendly Packet Adventure

🕵️‍♀️ Nmap & Scapy on Kali: A Beginner-Friendly Packet Adventure

Comments
16 min read
I Created an MCP Server and Why I Think MCP is Overrated

I Created an MCP Server and Why I Think MCP is Overrated

Comments
3 min read
Working Towards Improved PAM: Widening The Scope And Taking Control
Cover image for Working Towards Improved PAM: Widening The Scope And Taking Control

Working Towards Improved PAM: Widening The Scope And Taking Control

Comments
6 min read
How We Protect 100K+ Daily Users: Security Strategies for High-Traffic Web Platforms
Cover image for How We Protect 100K+ Daily Users: Security Strategies for High-Traffic Web Platforms

How We Protect 100K+ Daily Users: Security Strategies for High-Traffic Web Platforms

Comments
11 min read
loading...