Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
NCMEC Mandatory Reporting for Online Platforms: What Developers Need to Know

NCMEC Mandatory Reporting for Online Platforms: What Developers Need to Know

Comments
6 min read
Prowler is great. Here's what to do with 400 findings.
Cover image for Prowler is great. Here's what to do with 400 findings.

Prowler is great. Here's what to do with 400 findings.

Comments
4 min read
The agent didn't malfunction. The access was wrong.

The agent didn't malfunction. The access was wrong.

Comments
2 min read
Two Types of npm Supply Chain Attack: What Catches Each

Two Types of npm Supply Chain Attack: What Catches Each

Comments
5 min read
Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification
Cover image for Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification

Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification

Comments
8 min read
Separating Agent Tool Calls from Authorization and Evidence

Separating Agent Tool Calls from Authorization and Evidence

Comments
10 min read
How a $292M Exploit Redefined Cross-Chain Security: The KelpDAO Incident

How a $292M Exploit Redefined Cross-Chain Security: The KelpDAO Incident

Comments
2 min read
DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 5 - Container Scanning with Trivy

DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 5 - Container Scanning with Trivy

Comments
4 min read
COPPA Compliance for Platform Developers: What the Law Actually Requires and How to Build It

COPPA Compliance for Platform Developers: What the Law Actually Requires and How to Build It

Comments
7 min read
Add Child Safety to Your Platform in 30 Minutes: A SENTINEL Integration Guide

Add Child Safety to Your Platform in 30 Minutes: A SENTINEL Integration Guide

Comments
5 min read
DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 4 - IaC Scanning with Checkov

DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 4 - IaC Scanning with Checkov

Comments
3 min read
DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 2 - SAST with Bandit

DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 2 - SAST with Bandit

Comments
4 min read
DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 1 - Secret Scanning with Gitleaks

DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 1 - Secret Scanning with Gitleaks

Comments
4 min read
How to Build a HaveIBeenPwned Breach Auditor in Python
Cover image for How to Build a HaveIBeenPwned Breach Auditor in Python

How to Build a HaveIBeenPwned Breach Auditor in Python

1
Comments
9 min read
Windows PrivEsc 01: Initial Enumeration (The Part That Actually Matters)
Cover image for Windows PrivEsc 01: Initial Enumeration (The Part That Actually Matters)

Windows PrivEsc 01: Initial Enumeration (The Part That Actually Matters)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.