Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene
Cover image for Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene

Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene

1
Comments
4 min read
Kubernetes Security Control Plane vs Data Plane

Kubernetes Security Control Plane vs Data Plane

1
Comments
4 min read
The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back
Cover image for The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back

The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back

Comments
4 min read
SavvyWolf Web Shell - Manager Variant

SavvyWolf Web Shell - Manager Variant

Comments
2 min read
The "Vibecoding" Trap: Why AI Tools Like Kiro Are a Security Force Multiplier
Cover image for The "Vibecoding" Trap: Why AI Tools Like Kiro Are a Security Force Multiplier

The "Vibecoding" Trap: Why AI Tools Like Kiro Are a Security Force Multiplier

4
Comments 6
2 min read
Protecting Sensitive Data Using Envelope Encryption
Cover image for Protecting Sensitive Data Using Envelope Encryption

Protecting Sensitive Data Using Envelope Encryption

Comments
6 min read
Why Your Honeypot Catches Humans (Not Bots)

Why Your Honeypot Catches Humans (Not Bots)

2
Comments
3 min read
👉 Por que o roteador da operadora não deveria ser o coração da sua rede

👉 Por que o roteador da operadora não deveria ser o coração da sua rede

1
Comments 1
3 min read
Rust Weekly Log: Tracing, Observability & Cryptographic Hashes

Rust Weekly Log: Tracing, Observability & Cryptographic Hashes

Comments
1 min read
I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint
Cover image for I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint

I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint

Comments
23 min read
Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective
Cover image for Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective

Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective

Comments
3 min read
Security news weekly round-up - 30th January 2026
Cover image for Security news weekly round-up - 30th January 2026

Security news weekly round-up - 30th January 2026

Comments
3 min read
QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors
Cover image for QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

6
Comments 2
2 min read
Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks
Cover image for Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks

Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks

Comments
5 min read
Is Your AI Agent a Compliance Risk? How to Find Violations Hidden in Traces
Cover image for Is Your AI Agent a Compliance Risk? How to Find Violations Hidden in Traces

Is Your AI Agent a Compliance Risk? How to Find Violations Hidden in Traces

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.