Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Supply Chain Security measures
Cover image for Supply Chain Security measures

Supply Chain Security measures

Comments
1 min read
Windows 11 Security Hardening: Practical Steps That Actually Matter

Windows 11 Security Hardening: Practical Steps That Actually Matter

Comments
4 min read
Gemtracker v1.0.5 is here!

Gemtracker v1.0.5 is here!

1
Comments
1 min read
The Trusted Document Problem: Why Indirect Prompt Injection Is Now Your AI Agent's #1 Security Risk
Cover image for The Trusted Document Problem: Why Indirect Prompt Injection Is Now Your AI Agent's #1 Security Risk

The Trusted Document Problem: Why Indirect Prompt Injection Is Now Your AI Agent's #1 Security Risk

Comments
9 min read
I Scanned 2,000 OpenClaw Skills for Malicious Patterns — 14.5% Failed

I Scanned 2,000 OpenClaw Skills for Malicious Patterns — 14.5% Failed

Comments
4 min read
FaceAuth: Open Source Face Unlock for Linux

FaceAuth: Open Source Face Unlock for Linux

Comments
1 min read
Zero Trust for AI Agents: Why Identity-Based Security Collapses When Machines Call the Shots

Zero Trust for AI Agents: Why Identity-Based Security Collapses When Machines Call the Shots

Comments
8 min read
Stop Using Binary Pass/Fail for AI Agent Security — Use Context-Aware Policies Instead

Stop Using Binary Pass/Fail for AI Agent Security — Use Context-Aware Policies Instead

Comments
4 min read
Smart Contract Auditing: Why It's Non-Negotiable and How to Protect Your Project (2026)
Cover image for Smart Contract Auditing: Why It's Non-Negotiable and How to Protect Your Project (2026)

Smart Contract Auditing: Why It's Non-Negotiable and How to Protect Your Project (2026)

Comments
11 min read
Citrix NetScaler CVE-2026-3055: Two Memory Overread Bugs, One CVE, Active Exploitation

Citrix NetScaler CVE-2026-3055: Two Memory Overread Bugs, One CVE, Active Exploitation

Comments
5 min read
Agent Self-Reporting Is Not Evidence. Here Is What to Do About It.

Agent Self-Reporting Is Not Evidence. Here Is What to Do About It.

Comments
5 min read
Securing My AWS Portfolio Website with HTTPS and IAM
Cover image for Securing My AWS Portfolio Website with HTTPS and IAM

Securing My AWS Portfolio Website with HTTPS and IAM

Comments
1 min read
HIPAA Audit Logging Requirements: What to Log, How to Protect It, and Why It Matters in an Investigation

HIPAA Audit Logging Requirements: What to Log, How to Protect It, and Why It Matters in an Investigation

Comments
4 min read
GHSA-GHC5-95C2-VWCV: GHSA-GHC5-95C2-VWCV: Insufficient Entropy in Cookie Encryption within Auth0 Symfony SDK

GHSA-GHC5-95C2-VWCV: GHSA-GHC5-95C2-VWCV: Insufficient Entropy in Cookie Encryption within Auth0 Symfony SDK

Comments
2 min read
9 AppArmor Kernel Bugs Hidden Since 2017 — Root Escalation, Container Escape, and 12.6M Linux Systems Exposed

9 AppArmor Kernel Bugs Hidden Since 2017 — Root Escalation, Container Escape, and 12.6M Linux Systems Exposed

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.