Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
We have identified over 50 Security Hardening Tasks for ShieldX!

We have identified over 50 Security Hardening Tasks for ShieldX!

1
Comments
2 min read
The Audio Illusion: How Easily AI Deepfakes Deceive Our Ears

The Audio Illusion: How Easily AI Deepfakes Deceive Our Ears

1
Comments
2 min read
Stopping Bad Actors: Inside 1Password’s Security Model
Cover image for Stopping Bad Actors: Inside 1Password’s Security Model

Stopping Bad Actors: Inside 1Password’s Security Model

Comments
7 min read
Lesson 14: Risk Management

Lesson 14: Risk Management

Comments
3 min read
Audio Deepfakes: The Detection Illusion

Audio Deepfakes: The Detection Illusion

1
Comments
2 min read
AI Unleashed: Secure LLM Inference for Everyone

AI Unleashed: Secure LLM Inference for Everyone

5
Comments
2 min read
AI Unleashed, Privacy Preserved: The Future of Secure LLMs by Arvind Sundararajan

AI Unleashed, Privacy Preserved: The Future of Secure LLMs by Arvind Sundararajan

1
Comments
2 min read
Unlock AI Insights, Protect Your Secrets: Privacy-First LLMs Are Here!

Unlock AI Insights, Protect Your Secrets: Privacy-First LLMs Are Here!

1
Comments
2 min read
Audio Deepfakes: The Achilles' Heel in Voice Biometrics

Audio Deepfakes: The Achilles' Heel in Voice Biometrics

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 14, 2025

Outil de Cybersécurité du Jour - Sep 14, 2025

5
Comments
2 min read
Building an HTTP Server from Scratch in C: A Journey into Network Programming

Building an HTTP Server from Scratch in C: A Journey into Network Programming

7
Comments 2
6 min read
Audio Deepfakes: The Hidden Flaw in Our Defenses by Arvind Sundararajan

Audio Deepfakes: The Hidden Flaw in Our Defenses by Arvind Sundararajan

1
Comments
2 min read
Airdrops are safe but what about dusting 🤔 How to distinguish the two
Cover image for Airdrops are safe but what about dusting 🤔 How to distinguish the two

Airdrops are safe but what about dusting 🤔 How to distinguish the two

Comments
5 min read
User Secrets: The Right Way to Protect API Keys in .NET
Cover image for User Secrets: The Right Way to Protect API Keys in .NET

User Secrets: The Right Way to Protect API Keys in .NET

1
Comments
3 min read
AI for Everyone: Secure Language Models Without the Hardware Hype

AI for Everyone: Secure Language Models Without the Hardware Hype

1
Comments
2 min read
A Developer's Guide: How to Integrate a Payment Gateway Into a Website
Cover image for A Developer's Guide: How to Integrate a Payment Gateway Into a Website

A Developer's Guide: How to Integrate a Payment Gateway Into a Website

Comments
6 min read
How I lost $996,000 through Zoom
Cover image for How I lost $996,000 through Zoom

How I lost $996,000 through Zoom

5
Comments
5 min read
David Gilbertson Warned us About The Latest NPM Attack

David Gilbertson Warned us About The Latest NPM Attack

Comments
1 min read
Creating and Maintaining Chroot Environments

Creating and Maintaining Chroot Environments

2
Comments
5 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery
Cover image for Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

1
Comments
4 min read
Prompt Injection 2.0: The New Frontier of AI Attacks
Cover image for Prompt Injection 2.0: The New Frontier of AI Attacks

Prompt Injection 2.0: The New Frontier of AI Attacks

3
Comments
7 min read
Oops I goto It Again
Cover image for Oops I goto It Again

Oops I goto It Again

1
Comments
1 min read
🔒 Vulnerability Remediation (Cybersecurity Patch) 🛠️ by Avoiding Broken Access Control 🚫
Cover image for 🔒 Vulnerability Remediation (Cybersecurity Patch) 🛠️ by Avoiding Broken Access Control 🚫

🔒 Vulnerability Remediation (Cybersecurity Patch) 🛠️ by Avoiding Broken Access Control 🚫

9
Comments
2 min read
loading...