Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introducing FirstImpressionAI: Smart Resume–Job Match Analysis and Tailored Cover Letters

Introducing FirstImpressionAI: Smart Resume–Job Match Analysis and Tailored Cover Letters

Comments
4 min read
Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Comments
7 min read
Nvidia rejects US demand for backdoors in AI chips
Cover image for Nvidia rejects US demand for backdoors in AI chips

Nvidia rejects US demand for backdoors in AI chips

Comments
1 min read
Grok generates fake Taylor Swift nudes without being asked
Cover image for Grok generates fake Taylor Swift nudes without being asked

Grok generates fake Taylor Swift nudes without being asked

Comments
1 min read
OpenAI releases a free GPT model that can run right on your laptop
Cover image for OpenAI releases a free GPT model that can run right on your laptop

OpenAI releases a free GPT model that can run right on your laptop

Comments
1 min read
Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves
Cover image for Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves

Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves

7
Comments 2
17 min read
Warpgate: The Smart Bastion Host That Will Change Your Workflow

Warpgate: The Smart Bastion Host That Will Change Your Workflow

Comments
3 min read
Networking Series 9: VPC Endpoints
Cover image for Networking Series 9: VPC Endpoints

Networking Series 9: VPC Endpoints

Comments
5 min read
Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Comments
3 min read
How Online JWT Decode Tools Work: Build One Yourself Step-by-Step

How Online JWT Decode Tools Work: Build One Yourself Step-by-Step

Comments
1 min read
The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe
Cover image for The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

11
Comments 2
5 min read
How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)
Cover image for How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

27
Comments
4 min read
Eyes Wide Shut
Cover image for Eyes Wide Shut

Eyes Wide Shut

Comments
16 min read
Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others
Cover image for Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Comments
5 min read
Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide
Cover image for Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide

Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide

5
Comments
4 min read
How React/Next.js Developers Can Defend Against Inline Style Exfiltration (ISE)
Cover image for How React/Next.js Developers Can Defend Against Inline Style Exfiltration (ISE)

How React/Next.js Developers Can Defend Against Inline Style Exfiltration (ISE)

6
Comments 1
4 min read
Managing Secrets in Dev Tools Without Getting Yelled At
Cover image for Managing Secrets in Dev Tools Without Getting Yelled At

Managing Secrets in Dev Tools Without Getting Yelled At

2
Comments
7 min read
Protecting Yourself from Spear Phishing Attacks Such as the One Targeting NPM Maintainers with 2FA Update
Cover image for Protecting Yourself from Spear Phishing Attacks Such as the One Targeting NPM Maintainers with 2FA Update

Protecting Yourself from Spear Phishing Attacks Such as the One Targeting NPM Maintainers with 2FA Update

1
Comments
3 min read
Petoron Quantum Standard (PQS)
Cover image for Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
Petoron Local Destroyer (PLD)
Cover image for Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
What Really Defines a Botnet?

What Really Defines a Botnet?

2
Comments
2 min read
Essential Cybersecurity Practices for Small Businesses Without a Tech Team

Essential Cybersecurity Practices for Small Businesses Without a Tech Team

1
Comments
2 min read
How to set up Single Sign-On in AWS (IAM Identity Center)
Cover image for How to set up Single Sign-On in AWS (IAM Identity Center)

How to set up Single Sign-On in AWS (IAM Identity Center)

2
Comments
4 min read
SPF, DKIM, and DMARC Explained Simply (with Infographics)
Cover image for SPF, DKIM, and DMARC Explained Simply (with Infographics)

SPF, DKIM, and DMARC Explained Simply (with Infographics)

Comments 1
1 min read
🚨 Building an IOC Triage Pipeline with Suricata + ML + Docker

🚨 Building an IOC Triage Pipeline with Suricata + ML + Docker

Comments
2 min read
loading...