Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

5
Comments
2 min read
AI SAST vs AI DAST: Friends or Foes? Building a Comprehensive Testing Strategy

AI SAST vs AI DAST: Friends or Foes? Building a Comprehensive Testing Strategy

6
Comments
3 min read
GitHub Actions: Why You Should Pin Your Actions to a Specific Version

GitHub Actions: Why You Should Pin Your Actions to a Specific Version

4
Comments 1
4 min read
Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

1
Comments
4 min read
Selecting the appropriate Docker base image
Cover image for Selecting the appropriate Docker base image

Selecting the appropriate Docker base image

8
Comments
4 min read
How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !
Cover image for How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

2
Comments
4 min read
Best Secret Scanning Tools for 2025: What Every Developer Needs to Know
Cover image for Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

6
Comments
3 min read
🚫Never Use finalize() in Java

🚫Never Use finalize() in Java

3
Comments
3 min read
The Silent Thief in Your Code: When AI Assistants Get Hacked

The Silent Thief in Your Code: When AI Assistants Get Hacked

Comments
2 min read
Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso
Cover image for Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Comments
9 min read
Why I Built a Free Security Scanner That Makes Sense
Cover image for Why I Built a Free Security Scanner That Makes Sense

Why I Built a Free Security Scanner That Makes Sense

4
Comments 1
5 min read
Deploying a Honeypot SOC with Microsoft Sentinel

Deploying a Honeypot SOC with Microsoft Sentinel

1
Comments
3 min read
Smart Fuzzing: How AI is Automating JavaScript Bug Hunts

Smart Fuzzing: How AI is Automating JavaScript Bug Hunts

Comments
2 min read
Why the Principle of Least Privilege Is Critical for Non-Human Identities
Cover image for Why the Principle of Least Privilege Is Critical for Non-Human Identities

Why the Principle of Least Privilege Is Critical for Non-Human Identities

Comments
7 min read
📰 Major Tech News: Oct 13th, 2025
Cover image for 📰 Major Tech News: Oct 13th, 2025

📰 Major Tech News: Oct 13th, 2025

20
Comments 2
3 min read
ShowDev: Building Web PSQC – From Idea to Website Certification Platform

ShowDev: Building Web PSQC – From Idea to Website Certification Platform

Comments
3 min read
Windows 11 September 2025 Update: New Features Explained
Cover image for Windows 11 September 2025 Update: New Features Explained

Windows 11 September 2025 Update: New Features Explained

Comments
3 min read
Security at Scale: Our npm Incident Response Story
Cover image for Security at Scale: Our npm Incident Response Story

Security at Scale: Our npm Incident Response Story

Comments
2 min read
SpiceDB HRBAC: A Practical Implementation

SpiceDB HRBAC: A Practical Implementation

2
Comments
2 min read
How do you keep sensitive stuff (files/folders and secrets) from showing in coding tutorials?

How do you keep sensitive stuff (files/folders and secrets) from showing in coding tutorials?

Comments
1 min read
Privacy, Data Handling, and Regulatory Compliance in Angular Applications

Privacy, Data Handling, and Regulatory Compliance in Angular Applications

6
Comments
3 min read
Modern Firewall Solutions Uncovered: Battle-Tested Analysis of OPNsense, CrowdSec & Maltrail for DevOps

Modern Firewall Solutions Uncovered: Battle-Tested Analysis of OPNsense, CrowdSec & Maltrail for DevOps

Comments
7 min read
FlashFuzz ⚡Quick URL Fuzzing & Secret Scanning, straight from your browser
Cover image for FlashFuzz ⚡Quick URL Fuzzing & Secret Scanning, straight from your browser

FlashFuzz ⚡Quick URL Fuzzing & Secret Scanning, straight from your browser

6
Comments
3 min read
Security Considerations for Multi-Cluster Cloud Architecture (HA EKS with Databases)
Cover image for Security Considerations for Multi-Cluster Cloud Architecture (HA EKS with Databases)

Security Considerations for Multi-Cluster Cloud Architecture (HA EKS with Databases)

2
Comments 1
7 min read
Cybersecurity in 2025: Are We Really Ready?

Cybersecurity in 2025: Are We Really Ready?

Comments 1
1 min read
loading...