Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
API Security with encrypted value in endpoints
Cover image for API Security with encrypted value in endpoints

API Security with encrypted value in endpoints

Comments
2 min read
Integrate Cloudflare Turnstile into Astro and React Application
Cover image for Integrate Cloudflare Turnstile into Astro and React Application

Integrate Cloudflare Turnstile into Astro and React Application

Comments
5 min read
Nathbrok — Encrypted Messaging, File Storage & Business Communications Platform

Nathbrok — Encrypted Messaging, File Storage & Business Communications Platform

Comments
1 min read
I Analyzed My Browser Cookies - 1,572 Trackers Found. Here's What They Know About Me.
Cover image for I Analyzed My Browser Cookies - 1,572 Trackers Found. Here's What They Know About Me.

I Analyzed My Browser Cookies - 1,572 Trackers Found. Here's What They Know About Me.

Comments
6 min read
Decoding Urban Chaos: AI's Edge in Real-Time Traffic Anomaly Detection

Decoding Urban Chaos: AI's Edge in Real-Time Traffic Anomaly Detection

Comments
2 min read
Audio's New Frontier: Balancing Creation and Copyright in the AI Age by Arvind Sundararajan

Audio's New Frontier: Balancing Creation and Copyright in the AI Age by Arvind Sundararajan

Comments
2 min read
The Passkey Revolution: Why 2025 Is the Year Passwords Finally Die

The Passkey Revolution: Why 2025 Is the Year Passwords Finally Die

1
Comments
2 min read
What Is SIEM? Understanding Its Role in the Modern Cybersecurity Ecosystem

What Is SIEM? Understanding Its Role in the Modern Cybersecurity Ecosystem

Comments
3 min read
ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware
Cover image for ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

Comments
5 min read
The Art Of System Awareness: Reading Signals With Code

The Art Of System Awareness: Reading Signals With Code

Comments
8 min read
Excessive Agency in Agentic AI: Setting Safe Boundaries
Cover image for Excessive Agency in Agentic AI: Setting Safe Boundaries

Excessive Agency in Agentic AI: Setting Safe Boundaries

Comments
9 min read
Security news weekly round-up - 28th November 2025
Cover image for Security news weekly round-up - 28th November 2025

Security news weekly round-up - 28th November 2025

1
Comments
3 min read
GitLab Exposes Widespread NPM Supply Chain Attack

GitLab Exposes Widespread NPM Supply Chain Attack

Comments
6 min read
Shadow Routes: Threading Yourself Through The Cracks In A City
Cover image for Shadow Routes: Threading Yourself Through The Cracks In A City

Shadow Routes: Threading Yourself Through The Cracks In A City

Comments
7 min read
I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)
Cover image for I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)

I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)

1
Comments 2
5 min read
How to Evaluate Smart Device + Token Projects: A Checklist for Crypto Investors & Builders

How to Evaluate Smart Device + Token Projects: A Checklist for Crypto Investors & Builders

Comments
2 min read
70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.
Cover image for 70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

Comments
1 min read
Modernizing Telecom Security ML Powered Approach

Modernizing Telecom Security ML Powered Approach

Comments
5 min read
Beyond Filters: Rearchitecting Prompt Injection Defense
Cover image for Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

2
Comments
4 min read
48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production
Cover image for 48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

Comments
1 min read
Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Comments
2 min read
What is Networking? A Hacker’s Guide to Understanding the Web of Connections
Cover image for What is Networking? A Hacker’s Guide to Understanding the Web of Connections

What is Networking? A Hacker’s Guide to Understanding the Web of Connections

Comments
4 min read
Build Your Own AIDE Automation - Guide

Build Your Own AIDE Automation - Guide

1
Comments
3 min read
How to Choose the Right DDoS Protection Service: Complete 2025 Business Guide

How to Choose the Right DDoS Protection Service: Complete 2025 Business Guide

1
Comments
6 min read
loading...