Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OpenAI's Warning: Why Prompt Injection is the Unsolvable Flaw of AI Agents

OpenAI's Warning: Why Prompt Injection is the Unsolvable Flaw of AI Agents

Comments
2 min read
I Built a Self-Hosted Content Moderation API (Open Source)

I Built a Self-Hosted Content Moderation API (Open Source)

Comments
3 min read
Stop Pasting Secrets into AI Chat - Use AI-Safe Credentials Instead

Stop Pasting Secrets into AI Chat - Use AI-Safe Credentials Instead

Comments 2
2 min read
OSI Layer 6—Presentation Layer Security
Cover image for OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
HTTP/2 and Header Consistency: The Holy Grail of Stealth
Cover image for HTTP/2 and Header Consistency: The Holy Grail of Stealth

HTTP/2 and Header Consistency: The Holy Grail of Stealth

Comments
6 min read
Seguridad: Nivel Aplicación
Cover image for Seguridad: Nivel Aplicación

Seguridad: Nivel Aplicación

Comments
1 min read
The Best Practices for Secure API Integration in Financial Services

The Best Practices for Secure API Integration in Financial Services

Comments
4 min read
Passkey Login & Smart Wallet Creation on Solana with Next.js and LazorKit — No More Seed Phrases!

Passkey Login & Smart Wallet Creation on Solana with Next.js and LazorKit — No More Seed Phrases!

Comments
9 min read
The Ultimate Guide to Let's Encrypt Wildcard SSL on Ubuntu (2026)

The Ultimate Guide to Let's Encrypt Wildcard SSL on Ubuntu (2026)

2
Comments
9 min read
Stop Sharing .env Files on Slack: Introducing Multi-User Encryption for VS Code

Stop Sharing .env Files on Slack: Introducing Multi-User Encryption for VS Code

Comments
2 min read
Stop Begging Your AI to Be Safe: The Case for Constraint Engineering
Cover image for Stop Begging Your AI to Be Safe: The Case for Constraint Engineering

Stop Begging Your AI to Be Safe: The Case for Constraint Engineering

Comments
4 min read
File Encryption: No Uploads, No Records — How to Password-Protect Any File in Your Browser

File Encryption: No Uploads, No Records — How to Password-Protect Any File in Your Browser

1
Comments
2 min read
How to Use JWT Authentication in Spring Boot (Java 21) — An End-to-End Beginner Guide

How to Use JWT Authentication in Spring Boot (Java 21) — An End-to-End Beginner Guide

6
Comments
10 min read
EIOC as a Detection Model: From Framework to Code
Cover image for EIOC as a Detection Model: From Framework to Code

EIOC as a Detection Model: From Framework to Code

Comments
5 min read
New Year, New Build: Traata Goes Mobile
Cover image for New Year, New Build: Traata Goes Mobile

New Year, New Build: Traata Goes Mobile

Comments
2 min read
The Day "Standard Security" Wasn't Enough: A Deep Dive into HTTP Headers

The Day "Standard Security" Wasn't Enough: A Deep Dive into HTTP Headers

1
Comments
3 min read
Protecting a document is not the same as proving it exists

Protecting a document is not the same as proving it exists

Comments
2 min read
Goodbye Fail2Ban: Hardening Netbird & Caddy with CrowdSec
Cover image for Goodbye Fail2Ban: Hardening Netbird & Caddy with CrowdSec

Goodbye Fail2Ban: Hardening Netbird & Caddy with CrowdSec

1
Comments
8 min read
Supply Chain Attacks on Mobile Apps and How Docker Stops Them Before They Ship

Supply Chain Attacks on Mobile Apps and How Docker Stops Them Before They Ship

Comments
3 min read
Securing the Future: A Practical Guide to AWS Agentic AI Security

Securing the Future: A Practical Guide to AWS Agentic AI Security

Comments
5 min read
Web Application Security & XSS Mitigation write up

Web Application Security & XSS Mitigation write up

Comments
14 min read
Is “Hiding” Your WordPress Login and Common Paths a Smart Security Move?
Cover image for Is “Hiding” Your WordPress Login and Common Paths a Smart Security Move?

Is “Hiding” Your WordPress Login and Common Paths a Smart Security Move?

Comments
4 min read
Beyond `apt upgrade`: Automating Linux Hardening for Public Sector Workloads
Cover image for Beyond `apt upgrade`: Automating Linux Hardening for Public Sector Workloads

Beyond `apt upgrade`: Automating Linux Hardening for Public Sector Workloads

Comments
4 min read
I Thought It Was Refactoring My Code. It Actually Wiped It Out.

I Thought It Was Refactoring My Code. It Actually Wiped It Out.

Comments
3 min read
Day 11: New Year, New Security (Password Generator)
Cover image for Day 11: New Year, New Security (Password Generator)

Day 11: New Year, New Security (Password Generator)

Comments
1 min read
loading...