Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond
Cover image for DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond

DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond

5
Comments
15 min read
AWS Networking Fundamentals: Building a Secure Cloud Architecture
Cover image for AWS Networking Fundamentals: Building a Secure Cloud Architecture

AWS Networking Fundamentals: Building a Secure Cloud Architecture

1
Comments
5 min read
ALL The IoThings You Are
Cover image for ALL The IoThings You Are

ALL The IoThings You Are

Comments
4 min read
Goodbye enlightened AI
Cover image for Goodbye enlightened AI

Goodbye enlightened AI

Comments
1 min read
A MAGA bot network on X is divided over the Trump-Epstein backlash
Cover image for A MAGA bot network on X is divided over the Trump-Epstein backlash

A MAGA bot network on X is divided over the Trump-Epstein backlash

Comments
1 min read
OpenAI agreed to pay Oracle $30B a year for data center services
Cover image for OpenAI agreed to pay Oracle $30B a year for data center services

OpenAI agreed to pay Oracle $30B a year for data center services

Comments
1 min read
Compromised Amazon Q extension told AI to delete everything – and it shipped
Cover image for Compromised Amazon Q extension told AI to delete everything – and it shipped

Compromised Amazon Q extension told AI to delete everything – and it shipped

Comments
1 min read
Simplify OTP Generation with one-time-pass 🔑

Simplify OTP Generation with one-time-pass 🔑

2
Comments
2 min read
Fixing “Invalid Credentials” in AWS SSM Fleet Manager RDP
Cover image for Fixing “Invalid Credentials” in AWS SSM Fleet Manager RDP

Fixing “Invalid Credentials” in AWS SSM Fleet Manager RDP

Comments
2 min read
Anatomy of Email Security Vulnerabilities: How Spoofing, Protocol Weaknesses, and Misconfigurations Power Modern Attacks
Cover image for Anatomy of Email Security Vulnerabilities: How Spoofing, Protocol Weaknesses, and Misconfigurations Power Modern Attacks

Anatomy of Email Security Vulnerabilities: How Spoofing, Protocol Weaknesses, and Misconfigurations Power Modern Attacks

Comments
4 min read
Auditing Sensitive Data Changes in Laravel: Securing High-Risk Operations
Cover image for Auditing Sensitive Data Changes in Laravel: Securing High-Risk Operations

Auditing Sensitive Data Changes in Laravel: Securing High-Risk Operations

2
Comments
2 min read
Stop leaking .env files - try Secretsnap (free CLI)

Stop leaking .env files - try Secretsnap (free CLI)

6
Comments 1
1 min read
How to Securely Connect to Medusa.js Production Database on AWS?

How to Securely Connect to Medusa.js Production Database on AWS?

6
Comments 1
7 min read
Automating GitHub Actions Updates Across Your Entire Organization

Automating GitHub Actions Updates Across Your Entire Organization

1
Comments 1
9 min read
🏁 From Code to Cloud: My DevOps + DevSecOps Journey (Part 4/4 - The Reflection and Possible Routes)

🏁 From Code to Cloud: My DevOps + DevSecOps Journey (Part 4/4 - The Reflection and Possible Routes)

1
Comments 1
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.