Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Tea app data breach: What really happened?

The Tea app data breach: What really happened?

Comments
2 min read
Understanding the security landscape of MCP
Cover image for Understanding the security landscape of MCP

Understanding the security landscape of MCP

18
Comments 2
7 min read
What to do if your password appears in a Dataleak? Essential Steps for Password Security
Cover image for What to do if your password appears in a Dataleak? Essential Steps for Password Security

What to do if your password appears in a Dataleak? Essential Steps for Password Security

Comments
3 min read
Security news weekly round-up - 11th July 2025
Cover image for Security news weekly round-up - 11th July 2025

Security news weekly round-up - 11th July 2025

1
Comments
3 min read
Cybr - [LAB] [Challenge] Configure security groups and NACLs to specific requirements

Cybr - [LAB] [Challenge] Configure security groups and NACLs to specific requirements

Comments
8 min read
Elon Musk's AI chatbot churns out antisemitic posts days after update
Cover image for Elon Musk's AI chatbot churns out antisemitic posts days after update

Elon Musk's AI chatbot churns out antisemitic posts days after update

Comments
1 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)
Cover image for Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

2
Comments
13 min read
Boring Cybersecurity Theory: Where it all began
Cover image for Boring Cybersecurity Theory: Where it all began

Boring Cybersecurity Theory: Where it all began

1
Comments
5 min read
HackTheSite Basic 9

HackTheSite Basic 9

Comments
1 min read
Audience Engagement: Why Real-Time Interaction Wins Over Passive Content

Audience Engagement: Why Real-Time Interaction Wins Over Passive Content

Comments
2 min read
Role of Connection Credentials in Network Security Protocol Management
Cover image for Role of Connection Credentials in Network Security Protocol Management

Role of Connection Credentials in Network Security Protocol Management

1
Comments
3 min read
Kiro Just Went Live: Here’s Why I’m All In on GenAI for Security
Cover image for Kiro Just Went Live: Here’s Why I’m All In on GenAI for Security

Kiro Just Went Live: Here’s Why I’m All In on GenAI for Security

3
Comments
5 min read
DEK-KEK the industry standard to protect highly sensitive data (Part 1)
Cover image for DEK-KEK the industry standard to protect highly sensitive data (Part 1)

DEK-KEK the industry standard to protect highly sensitive data (Part 1)

Comments 3
6 min read
API Security
Cover image for API Security

API Security

Comments
5 min read
Adding Password Confirmation to Rails 8 Authentication

Adding Password Confirmation to Rails 8 Authentication

1
Comments
2 min read
Beware: ChatGPT Could Be Attacking You!
Cover image for Beware: ChatGPT Could Be Attacking You!

Beware: ChatGPT Could Be Attacking You!

2
Comments 2
5 min read
Securing MCP Servers: Adding Authentication with AuthAction

Securing MCP Servers: Adding Authentication with AuthAction

Comments
2 min read
Elon Musk's AI chatbot churns out antisemitic posts days after update
Cover image for Elon Musk's AI chatbot churns out antisemitic posts days after update

Elon Musk's AI chatbot churns out antisemitic posts days after update

Comments
1 min read
Memes only a Dev can relate to. (pt.3)

Memes only a Dev can relate to. (pt.3)

Comments
1 min read
Fixing CLI Error Handling: A Deep Dive into Keyshade's WebSocket Communication Bug
Cover image for Fixing CLI Error Handling: A Deep Dive into Keyshade's WebSocket Communication Bug

Fixing CLI Error Handling: A Deep Dive into Keyshade's WebSocket Communication Bug

Comments
20 min read
Catch Security Bugs Before They Catch You: A Developer's Guide

Catch Security Bugs Before They Catch You: A Developer's Guide

Comments
8 min read
How to Secure a Website and How SafeLine Helps

How to Secure a Website and How SafeLine Helps

5
Comments
3 min read
Building AgentSmith-HUB: A High-Performance Security Data Pipeline with Real-Time Detection
Cover image for Building AgentSmith-HUB: A High-Performance Security Data Pipeline with Real-Time Detection

Building AgentSmith-HUB: A High-Performance Security Data Pipeline with Real-Time Detection

1
Comments
3 min read
My AWS Cloud Resume Challenge

My AWS Cloud Resume Challenge

Comments
2 min read
Linus Tech Tips (LTT): Why Is Roblox Shielding Child Predators? - WAN Show August 15, 2025

Linus Tech Tips (LTT): Why Is Roblox Shielding Child Predators? - WAN Show August 15, 2025

Comments 1
1 min read
loading...