Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI Scams in 2025: 7 Real Examples and How to Avoid Them

AI Scams in 2025: 7 Real Examples and How to Avoid Them

Comments
3 min read
How I Reduced ELB Access Log Analysis Time by 80% Using AWS Data Processing MCP Server

How I Reduced ELB Access Log Analysis Time by 80% Using AWS Data Processing MCP Server

3
Comments
4 min read
Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems
Cover image for Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

1
Comments
6 min read
Snowflake

Snowflake

Comments
1 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI
Cover image for Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Comments
1 min read
Five ways ngrokkers 'doglab' gateways for homelabs and side projects
Cover image for Five ways ngrokkers 'doglab' gateways for homelabs and side projects

Five ways ngrokkers 'doglab' gateways for homelabs and side projects

3
Comments
3 min read
Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future
Cover image for Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

6
Comments
3 min read
The deceptive simplicity of auth

The deceptive simplicity of auth

2
Comments
3 min read
How Termux Helps You Learn Linux and Cybersecurity

How Termux Helps You Learn Linux and Cybersecurity

1
Comments
4 min read
Secure Your Network Using Termux Scanning Tools

Secure Your Network Using Termux Scanning Tools

1
Comments
4 min read
Cybr - Beginner's Guide to AWS CloudTrail for Security

Cybr - Beginner's Guide to AWS CloudTrail for Security

Comments
1 min read
Elon Musk's AI chatbot churns out antisemitic posts days after update
Cover image for Elon Musk's AI chatbot churns out antisemitic posts days after update

Elon Musk's AI chatbot churns out antisemitic posts days after update

Comments
1 min read
How Resolve Mixed Content Warnings After Installing SSL
Cover image for How Resolve Mixed Content Warnings After Installing SSL

How Resolve Mixed Content Warnings After Installing SSL

1
Comments
5 min read
Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Comments
1 min read
AI Governance in Banking - Key Challenges and Compliance Requirements

AI Governance in Banking - Key Challenges and Compliance Requirements

Comments
5 min read
Why Your CLI Tool Needs OAuth (Not API Keys)

Why Your CLI Tool Needs OAuth (Not API Keys)

Comments
3 min read
VPC Security: Building Fortress-Like Network Architecture
Cover image for VPC Security: Building Fortress-Like Network Architecture

VPC Security: Building Fortress-Like Network Architecture

1
Comments
6 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025
Cover image for When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
Security isn't a feature. It's a mindset.
Cover image for Security isn't a feature. It's a mindset.

Security isn't a feature. It's a mindset.

6
Comments
1 min read
Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)
Cover image for Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)

Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)

Comments
10 min read
AiHint Standard - Cryptographic Trust Verification for AI Agents
Cover image for AiHint Standard - Cryptographic Trust Verification for AI Agents

AiHint Standard - Cryptographic Trust Verification for AI Agents

Comments
4 min read
Connectivity Without Exposure
Cover image for Connectivity Without Exposure

Connectivity Without Exposure

5
Comments
4 min read
Jack Dorsey Unveils Offline Messaging App ‘Bitchat' with No Internet, Servers, or Accounts
Cover image for Jack Dorsey Unveils Offline Messaging App ‘Bitchat' with No Internet, Servers, or Accounts

Jack Dorsey Unveils Offline Messaging App ‘Bitchat' with No Internet, Servers, or Accounts

2
Comments
1 min read
Understanding OAuth 2.0 and OpenID Connect

Understanding OAuth 2.0 and OpenID Connect

Comments
3 min read
loading...