Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
My road to ML-KEM-768 over X25519 for my messaging app
Cover image for My road to ML-KEM-768 over X25519 for my messaging app

My road to ML-KEM-768 over X25519 for my messaging app

Comments
5 min read
Browser agents should be auditable, not undetectable

Browser agents should be auditable, not undetectable

Comments
4 min read
SPF and the Shift from Reporting to Operational Response

SPF and the Shift from Reporting to Operational Response

Comments
6 min read
What Are Indicators of Compromise (IOC)? A Complete Guide
Cover image for What Are Indicators of Compromise (IOC)? A Complete Guide

What Are Indicators of Compromise (IOC)? A Complete Guide

Comments
5 min read
Critical RCEs in Microsoft AI & GitHub, plus CrowdSec for Hardening

Critical RCEs in Microsoft AI & GitHub, plus CrowdSec for Hardening

Comments
3 min read
Building a Real‑Time Anomaly Detection Engine for Web Traffic

Building a Real‑Time Anomaly Detection Engine for Web Traffic

Comments
4 min read
AI Hallucinated Dependencies Are the New Supply Chain Attack: How to Stop Them

AI Hallucinated Dependencies Are the New Supply Chain Attack: How to Stop Them

Comments
8 min read
A Malicious Go Module Sat in the Mirror for 3 Years. Your go.sum Won't Save You
Cover image for A Malicious Go Module Sat in the Mirror for 3 Years. Your go.sum Won't Save You

A Malicious Go Module Sat in the Mirror for 3 Years. Your go.sum Won't Save You

Comments
10 min read
AI Security Is Broken — And We’re Testing the Wrong Things

AI Security Is Broken — And We’re Testing the Wrong Things

Comments
2 min read
🚨 تنبيه أمني عاجل - ثغرة حرجة في tj-actions/changed-files

🚨 تنبيه أمني عاجل - ثغرة حرجة في tj-actions/changed-files

Comments
3 min read
What AppSec Engineers Actually Do (and Why It Matters)

What AppSec Engineers Actually Do (and Why It Matters)

Comments
7 min read
How to Secure Voice and Biometric Data in Your AI Training Pipeline
Cover image for How to Secure Voice and Biometric Data in Your AI Training Pipeline

How to Secure Voice and Biometric Data in Your AI Training Pipeline

Comments
5 min read
Strengthening Protocol Architecture Against Flash Loan Attacks

Strengthening Protocol Architecture Against Flash Loan Attacks

Comments
11 min read
Why the $292M KelpDAO Exploit Proves Smart Contract Audits Aren't Enough.
Cover image for Why the $292M KelpDAO Exploit Proves Smart Contract Audits Aren't Enough.

Why the $292M KelpDAO Exploit Proves Smart Contract Audits Aren't Enough.

Comments
1 min read
Stop Uploading Your Files: Build Privacy-First Tools in the Browser
Cover image for Stop Uploading Your Files: Build Privacy-First Tools in the Browser

Stop Uploading Your Files: Build Privacy-First Tools in the Browser

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.