Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Windows RPC Privilege Escalation, AI Supply Chain Breach, & Minecraft Auditing Tool

Windows RPC Privilege Escalation, AI Supply Chain Breach, & Minecraft Auditing Tool

Comments
3 min read
How to Build a Production-Ready Secure Python API (JWT, Rate Limiting, and Caching)

How to Build a Production-Ready Secure Python API (JWT, Rate Limiting, and Caching)

Comments
2 min read
97% Expect a Major AI Agent Incident This Year. Are You in the 3%?
Cover image for 97% Expect a Major AI Agent Incident This Year. Are You in the 3%?

97% Expect a Major AI Agent Incident This Year. Are You in the 3%?

Comments
8 min read
I Built a 100% Serverless, Zero-Log Secure Voice Chat (And Here is Why)
Cover image for I Built a 100% Serverless, Zero-Log Secure Voice Chat (And Here is Why)

I Built a 100% Serverless, Zero-Log Secure Voice Chat (And Here is Why)

Comments
4 min read
From Audit Findings to Low-Risk Fixes on a Managed WordPress Site

From Audit Findings to Low-Risk Fixes on a Managed WordPress Site

Comments
4 min read
Why I chose Cybersecurity (and why you might too)

Why I chose Cybersecurity (and why you might too)

Comments 1
1 min read
AI-Generated Auth Code vs Managed Auth Services: A Honest Comparison
Cover image for AI-Generated Auth Code vs Managed Auth Services: A Honest Comparison

AI-Generated Auth Code vs Managed Auth Services: A Honest Comparison

2
Comments
5 min read
5 Critical Security Vulnerabilities in Python APIs (and How to Fix Them in Production)

5 Critical Security Vulnerabilities in Python APIs (and How to Fix Them in Production)

Comments
2 min read
Why I stopped rebuilding auth from scratch and built a universal trust layer instead
Cover image for Why I stopped rebuilding auth from scratch and built a universal trust layer instead

Why I stopped rebuilding auth from scratch and built a universal trust layer instead

Comments
2 min read
How I handle bulk WHOIS lookups at scale: lessons from running a domain API
Cover image for How I handle bulk WHOIS lookups at scale: lessons from running a domain API

How I handle bulk WHOIS lookups at scale: lessons from running a domain API

Comments
4 min read
# Supercharging My SOC Pipeline With VirusTotal Enrichment — Know Your Attacker Before You Block Them
Cover image for # Supercharging My SOC Pipeline With VirusTotal Enrichment — Know Your Attacker Before You Block Them

# Supercharging My SOC Pipeline With VirusTotal Enrichment — Know Your Attacker Before You Block Them

Comments
5 min read
Our Auditor Asked How We Prove Logs Aren

Our Auditor Asked How We Prove Logs Aren

Comments
5 min read
Closed-Loop IAM Remediation: Auto-Fixing Security Misconfigurations Without a Human in the Loop

Closed-Loop IAM Remediation: Auto-Fixing Security Misconfigurations Without a Human in the Loop

Comments
7 min read
Biometric Key Rotation: Securing Tunnels with Real-Time Wearable Entropy

Biometric Key Rotation: Securing Tunnels with Real-Time Wearable Entropy

Comments
12 min read
🦞 I Built a Safe Autonomous Email Agent with OpenClaw and It Actually Works

OpenClaw Challenge Submission 🦞

🦞 I Built a Safe Autonomous Email Agent with OpenClaw and It Actually Works

5
Comments 1
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.