Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Fundamentos de AppSec: Protegiendo el Corazón de tus Aplicaciones
Cover image for Fundamentos de AppSec: Protegiendo el Corazón de tus Aplicaciones

Fundamentos de AppSec: Protegiendo el Corazón de tus Aplicaciones

Comments
4 min read
🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque
Cover image for 🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque

🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque

Comments
3 min read
1.5M Tokens Exposed: How Moltbook’s 🦀 AI Social Network Tripped on Security
Cover image for 1.5M Tokens Exposed: How Moltbook’s 🦀 AI Social Network Tripped on Security

1.5M Tokens Exposed: How Moltbook’s 🦀 AI Social Network Tripped on Security

19
Comments 1
7 min read
eslint-plugin-security Is Unmaintained. Here's What Nobody Tells You.
Cover image for eslint-plugin-security Is Unmaintained. Here's What Nobody Tells You.

eslint-plugin-security Is Unmaintained. Here's What Nobody Tells You.

Comments
8 min read
I Open-Sourced a Tool to Detect Weak JWT Secrets 🔐

I Open-Sourced a Tool to Detect Weak JWT Secrets 🔐

Comments
2 min read
IAM Fundamentals

IAM Fundamentals

Comments
2 min read
AWS Resource Control Policies (RCPs) Explained: A Practical Guide to Resource-Level Security
Cover image for AWS Resource Control Policies (RCPs) Explained: A Practical Guide to Resource-Level Security

AWS Resource Control Policies (RCPs) Explained: A Practical Guide to Resource-Level Security

1
Comments
4 min read
Troubleshooting EFS Mount Failures in EKS: The IAM Mount Option Mystery
Cover image for Troubleshooting EFS Mount Failures in EKS: The IAM Mount Option Mystery

Troubleshooting EFS Mount Failures in EKS: The IAM Mount Option Mystery

Comments
3 min read
Exploring a hardware-isolated OS shown at CES 2026

Exploring a hardware-isolated OS shown at CES 2026

Comments
1 min read
Por Qué el 87% de Sistemas MLOps Fallan el Checklist de Seguridad 2025
Cover image for Por Qué el 87% de Sistemas MLOps Fallan el Checklist de Seguridad 2025

Por Qué el 87% de Sistemas MLOps Fallan el Checklist de Seguridad 2025

Comments
6 min read
Observing Behavioral Anomalies in Web Applications Beyond Signature Scanners

Observing Behavioral Anomalies in Web Applications Beyond Signature Scanners

Comments
1 min read
Building a "Spy-Free" communication tool from scratch. 🛡️💻

Building a "Spy-Free" communication tool from scratch. 🛡️💻

1
Comments
1 min read
Configuring Authorization for Access to an MCP Server Using OpenIG

Configuring Authorization for Access to an MCP Server Using OpenIG

2
Comments
4 min read
Adding Cognito authentication to AWS DevOps Agent

Adding Cognito authentication to AWS DevOps Agent

2
Comments
4 min read
WP Compatibility Patch Backdoor

WP Compatibility Patch Backdoor

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.