Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Applying Semgrep SAST to Any Application

Applying Semgrep SAST to Any Application

3
Comments
3 min read
Outil de Cybersécurité du Jour - Aug 14, 2025

Outil de Cybersécurité du Jour - Aug 14, 2025

Comments
2 min read
Deploy Vaultwarden on Nanocl
Cover image for Deploy Vaultwarden on Nanocl

Deploy Vaultwarden on Nanocl

10
Comments
5 min read
Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

2
Comments
4 min read
Linus Tech Tips (LTT): I almost got Scammed TWICE!

Linus Tech Tips (LTT): I almost got Scammed TWICE!

Comments
1 min read
Protect Your Environments: Practical Security Tips for Smarter Deployments

Protect Your Environments: Practical Security Tips for Smarter Deployments

Comments
5 min read
Introducing WtfCode.dev: Learn from the Worst Code Examples

Introducing WtfCode.dev: Learn from the Worst Code Examples

Comments
3 min read
Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC
Cover image for Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC

Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC

Comments
2 min read
Building AuthPress: From Simple Telegram 2FA to Extensible WordPress Security Platform

Building AuthPress: From Simple Telegram 2FA to Extensible WordPress Security Platform

Comments
2 min read
🚀 From Zero to Secure: Deploying a Hardened Azure Environment with Terraform & Azure CLI
Cover image for 🚀 From Zero to Secure: Deploying a Hardened Azure Environment with Terraform & Azure CLI

🚀 From Zero to Secure: Deploying a Hardened Azure Environment with Terraform & Azure CLI

1
Comments
3 min read
Building a Unified AI Safety Platform
Cover image for Building a Unified AI Safety Platform

Building a Unified AI Safety Platform

Comments
5 min read
Boosting Network Monitoring with Guardius Ping Task
Cover image for Boosting Network Monitoring with Guardius Ping Task

Boosting Network Monitoring with Guardius Ping Task

Comments
1 min read
Top 5 Web Security Scanners in 2025: Protect Your Digital Assets
Cover image for Top 5 Web Security Scanners in 2025: Protect Your Digital Assets

Top 5 Web Security Scanners in 2025: Protect Your Digital Assets

1
Comments
3 min read
A New Day, a New Security Attack on npm…
Cover image for A New Day, a New Security Attack on npm…

A New Day, a New Security Attack on npm…

Comments
3 min read
What Are Game Servers and How Do They Work?

What Are Game Servers and How Do They Work?

Comments
3 min read
Silent Code: The Unseen Algorithms Reshaping Your Digital World
Cover image for Silent Code: The Unseen Algorithms Reshaping Your Digital World

Silent Code: The Unseen Algorithms Reshaping Your Digital World

Comments
2 min read
Implementing Continuous Access Control with OpenID CAEP

Implementing Continuous Access Control with OpenID CAEP

1
Comments
4 min read
Securing Agentic AI Systems
Cover image for Securing Agentic AI Systems

Securing Agentic AI Systems

2
Comments
12 min read
Puzzles for Hacker (task only)

Puzzles for Hacker (task only)

Comments
6 min read
Authentication vs. Authorization

Authentication vs. Authorization

Comments
1 min read
API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access
Cover image for API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

2
Comments
3 min read
SSH Key Authentication in Linux
Cover image for SSH Key Authentication in Linux

SSH Key Authentication in Linux

3
Comments
4 min read
CAPTCHA provider buyer’s guide 2025
Cover image for CAPTCHA provider buyer’s guide 2025

CAPTCHA provider buyer’s guide 2025

Comments
7 min read
💎 ANN: oauth2 v2.0.16 w/ full E2E example (& Instagram Compat)
Cover image for 💎 ANN: oauth2 v2.0.16 w/ full E2E example (& Instagram Compat)

💎 ANN: oauth2 v2.0.16 w/ full E2E example (& Instagram Compat)

7
Comments 1
5 min read
Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

1
Comments
4 min read
loading...