Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)
Cover image for Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)

Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)

1
Comments
2 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion
Cover image for Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
How I Run LLM Agents in a Secure Nix Sandbox
Cover image for How I Run LLM Agents in a Secure Nix Sandbox

How I Run LLM Agents in a Secure Nix Sandbox

Comments
5 min read
Why Auth0 email_verified Was Missing from My Access Token (And How to Fix It)
Cover image for Why Auth0 email_verified Was Missing from My Access Token (And How to Fix It)

Why Auth0 email_verified Was Missing from My Access Token (And How to Fix It)

Comments
3 min read
Why Does SOCKS5 Proxy Login Trigger Account Warnings or Failures When Switching Between Cloud and Local Access?

Why Does SOCKS5 Proxy Login Trigger Account Warnings or Failures When Switching Between Cloud and Local Access?

Comments
12 min read
Residential vs Dedicated Proxies: What "Dedicated" Means and How to Decide

Residential vs Dedicated Proxies: What "Dedicated" Means and How to Decide

Comments
15 min read
I built a Docker vulnerability scanner - Beta testers wanted!!!

I built a Docker vulnerability scanner - Beta testers wanted!!!

Comments
1 min read
Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it
Cover image for Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it

Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it

Comments
6 min read
Security Groups vs Network ACLs: The Two Firewalls You Didn’t Know You Were Using in AWS

Security Groups vs Network ACLs: The Two Firewalls You Didn’t Know You Were Using in AWS

Comments
5 min read
Application Layer: Where Software Meets the Network
Cover image for Application Layer: Where Software Meets the Network

Application Layer: Where Software Meets the Network

Comments
3 min read
Zero-Knowledge Security: Protecting Patient Privacy Through Client-Side Encryption

Zero-Knowledge Security: Protecting Patient Privacy Through Client-Side Encryption

Comments
3 min read
Did you know?

Did you know?

Comments
1 min read
Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work
Cover image for Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work

Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work

Comments
3 min read
Malicious Chrome Extensions Steal AI Chats: How to Protect Your Conversations in 2026

Malicious Chrome Extensions Steal AI Chats: How to Protect Your Conversations in 2026

1
Comments
4 min read
Designing Secure Plugin Architectures for Desktop Applications
Cover image for Designing Secure Plugin Architectures for Desktop Applications

Designing Secure Plugin Architectures for Desktop Applications

Comments
12 min read
Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)
Cover image for Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)

Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)

3
Comments 1
4 min read
AiCybr: 60+ Privacy-Focused Tools in One Place

AiCybr: 60+ Privacy-Focused Tools in One Place

Comments
3 min read
Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.
Cover image for Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.

Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.

Comments
1 min read
Protecting an EC2 hosted web application with AWS WAF in practice

Protecting an EC2 hosted web application with AWS WAF in practice

Comments
12 min read
Building a Fast File Transfer Tool, Part 2: Beating rsync by 58% with kTLS
Cover image for Building a Fast File Transfer Tool, Part 2: Beating rsync by 58% with kTLS

Building a Fast File Transfer Tool, Part 2: Beating rsync by 58% with kTLS

Comments
4 min read
Agent Security Explained By Dawn Song
Cover image for Agent Security Explained By Dawn Song

Agent Security Explained By Dawn Song

Comments
3 min read
New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse
Cover image for New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse

New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse

Comments 1
15 min read
The Modern Home Network Has No Safe Mode
Cover image for The Modern Home Network Has No Safe Mode

The Modern Home Network Has No Safe Mode

2
Comments
5 min read
Meet Orion-Belt, Go ZeroTrust Bastion
Cover image for Meet Orion-Belt, Go ZeroTrust Bastion

Meet Orion-Belt, Go ZeroTrust Bastion

Comments
3 min read
How do I backup my identity files (SSH/GPG) without compromising them?
Cover image for How do I backup my identity files (SSH/GPG) without compromising them?

How do I backup my identity files (SSH/GPG) without compromising them?

Comments
3 min read
loading...