Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
7 Open-Source Tools That Make File Upload Security Actually Manageable
Cover image for 7 Open-Source Tools That Make File Upload Security Actually Manageable

7 Open-Source Tools That Make File Upload Security Actually Manageable

Comments
5 min read
Forensic Engineering: Decoding the 37-Gear Architecture of a 2,000-Year-Old Computer

Forensic Engineering: Decoding the 37-Gear Architecture of a 2,000-Year-Old Computer

2
Comments
2 min read
Post-Quantum Cryptography
Cover image for Post-Quantum Cryptography

Post-Quantum Cryptography

Comments
5 min read
Codename: TEMPEST — The real magnitude of an 80-year-old threat
Cover image for Codename: TEMPEST — The real magnitude of an 80-year-old threat

Codename: TEMPEST — The real magnitude of an 80-year-old threat

Comments
3 min read
Do you know who the biggest temp mail providers are?

Do you know who the biggest temp mail providers are?

3
Comments 1
2 min read
The $10 Billion Trust Data Market That AI Companies Can't See

The $10 Billion Trust Data Market That AI Companies Can't See

Comments
8 min read
Tropic Trooper: Home Router Exploitation & Japanese Infrastructure Targeting
Cover image for Tropic Trooper: Home Router Exploitation & Japanese Infrastructure Targeting

Tropic Trooper: Home Router Exploitation & Japanese Infrastructure Targeting

Comments
6 min read
AI Agent Platform with Secure Notion Integration

AI Agent Platform with Secure Notion Integration

Comments
9 min read
Anthropic CVP Run 3 — Does Claude's Safety Stack Scale Down to Haiku 4.5?

Anthropic CVP Run 3 — Does Claude's Safety Stack Scale Down to Haiku 4.5?

Comments
3 min read
Inside React2Shell
Cover image for Inside React2Shell

Inside React2Shell

Comments
6 min read
🛠️ From Foundations to Advanced SecOps: The GCP Developer’s Toolkit 🛡️

🛠️ From Foundations to Advanced SecOps: The GCP Developer’s Toolkit 🛡️

Comments
2 min read
Stop Punishing Your Users with CAPTCHA: How I Built a Invisible Spam Blocker

Stop Punishing Your Users with CAPTCHA: How I Built a Invisible Spam Blocker

Comments
4 min read
How VeilShift™ Works — The Protocol That Bypasses DPI Blocking

How VeilShift™ Works — The Protocol That Bypasses DPI Blocking

Comments
4 min read
Bitwarden CLI Compromised: What Developers Need to Know About the Ongoing Checkmarx Supply Chain Attack

Bitwarden CLI Compromised: What Developers Need to Know About the Ongoing Checkmarx Supply Chain Attack

Comments
6 min read
The Execution Pipeline: A Secured Journey for Every Call
Cover image for The Execution Pipeline: A Secured Journey for Every Call

The Execution Pipeline: A Secured Journey for Every Call

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.