Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Turn Cloud "Trash" into a Golden 100GB Encrypted Vault (LVM + rclone)

How to Turn Cloud "Trash" into a Golden 100GB Encrypted Vault (LVM + rclone)

Comments
2 min read
Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System
Cover image for Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System

Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System

Comments
4 min read
A LinkedIn Job Offer Tried to Install Malware on My Machine
Cover image for A LinkedIn Job Offer Tried to Install Malware on My Machine

A LinkedIn Job Offer Tried to Install Malware on My Machine

4
Comments
8 min read
When Your Users Are Bots, Not People
Cover image for When Your Users Are Bots, Not People

When Your Users Are Bots, Not People

Comments
3 min read
AI Governance is Just Good DevOps: A Developer's Perspective
Cover image for AI Governance is Just Good DevOps: A Developer's Perspective

AI Governance is Just Good DevOps: A Developer's Perspective

3
Comments 5
5 min read
PHP Shell Ultimate Backdoor

PHP Shell Ultimate Backdoor

Comments
2 min read
The Ephemeral Signal Ethics Manifesto

The Ephemeral Signal Ethics Manifesto

Comments
2 min read
Malicious .htaccess Injection and Fake Index.php Dropper

Malicious .htaccess Injection and Fake Index.php Dropper

Comments
2 min read
Recursive .htaccess PHP Execution Lockout

Recursive .htaccess PHP Execution Lockout

Comments
2 min read
Goto Obfuscated Dropper

Goto Obfuscated Dropper

Comments
2 min read
Hello Aili Plugin Spam Injector

Hello Aili Plugin Spam Injector

Comments
2 min read
Securing IoT Devices Without Agents Using Network-Based Machine Learning
Cover image for Securing IoT Devices Without Agents Using Network-Based Machine Learning

Securing IoT Devices Without Agents Using Network-Based Machine Learning

Comments
11 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
Cover image for Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

1
Comments 2
5 min read
Security Risks of Mobile Authentication: Smartphone Login Is Unsafe

Security Risks of Mobile Authentication: Smartphone Login Is Unsafe

Comments
4 min read
Stop Managing Encryption Keys: Vault-as-a-Service in 5 Minutes

Stop Managing Encryption Keys: Vault-as-a-Service in 5 Minutes

Comments
13 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.