Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
PKI 101: Why Public Key Infrastructure matters
Cover image for PKI 101: Why Public Key Infrastructure matters

PKI 101: Why Public Key Infrastructure matters

3
Comments
6 min read
Mark Zuckerberg promises you can trust him with superintelligent AI
Cover image for Mark Zuckerberg promises you can trust him with superintelligent AI

Mark Zuckerberg promises you can trust him with superintelligent AI

Comments
1 min read
Meta Is Going to Let Job Candidates Use AI During Coding Tests
Cover image for Meta Is Going to Let Job Candidates Use AI During Coding Tests

Meta Is Going to Let Job Candidates Use AI During Coding Tests

Comments
1 min read
🛡️ Kubernetes Pod Security Best Practices: 13 Key Strategies for Hardening Your Workloads

🛡️ Kubernetes Pod Security Best Practices: 13 Key Strategies for Hardening Your Workloads

5
Comments
4 min read
Avoiding Common JWT Pitfalls in React Native Development

Avoiding Common JWT Pitfalls in React Native Development

Comments
2 min read
TraplessPKE — A New Direction for Post-Quantum Cryptography

TraplessPKE — A New Direction for Post-Quantum Cryptography

Comments
2 min read
🚨 Warning for Anyone Using AI-Native Browsers Like Comet 🚨

🚨 Warning for Anyone Using AI-Native Browsers Like Comet 🚨

Comments
1 min read
My Experience Fixing clasp Login Errors on Google Workspace

My Experience Fixing clasp Login Errors on Google Workspace

Comments
4 min read
Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall
Cover image for Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Comments
3 min read
Adversarial Attacks on Generative AI: A Growing Concern in the AI Era
Cover image for Adversarial Attacks on Generative AI: A Growing Concern in the AI Era

Adversarial Attacks on Generative AI: A Growing Concern in the AI Era

1
Comments
4 min read
From a Single Container to a Secure Application Stack: A Practical Guide to Docker and Server Hardening

From a Single Container to a Secure Application Stack: A Practical Guide to Docker and Server Hardening

Comments
5 min read
Offensive security - Testing for Broken Access Control (OWASP)
Cover image for Offensive security - Testing for Broken Access Control (OWASP)

Offensive security - Testing for Broken Access Control (OWASP)

Comments
1 min read
Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)
Cover image for Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)

Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)

Comments
4 min read
Prompt Chainmail: Security middleware for AI applications
Cover image for Prompt Chainmail: Security middleware for AI applications

Prompt Chainmail: Security middleware for AI applications

1
Comments 3
4 min read
Gateway-Oriented Architecture (GOA)

Gateway-Oriented Architecture (GOA)

Comments
3 min read
Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews
Cover image for Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Comments
3 min read
GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits
Cover image for GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

5
Comments
19 min read
Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Comments
1 min read
Logs Fundamentals for Cybersecurity: What Every Analyst Should Know
Cover image for Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Comments
10 min read
🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy
Cover image for 🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy

🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy

Comments
2 min read
Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch
Cover image for Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Comments
3 min read
Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

3
Comments 1
8 min read
Security news weekly round-up - 5th September 2025
Cover image for Security news weekly round-up - 5th September 2025

Security news weekly round-up - 5th September 2025

1
Comments
2 min read
Building Own Stream Cipher: Part 2 - RC4: From Ubiquity to Collapse and What It Taught Us About Trust
Cover image for Building Own Stream Cipher: Part 2 - RC4: From Ubiquity to Collapse and What It Taught Us About Trust

Building Own Stream Cipher: Part 2 - RC4: From Ubiquity to Collapse and What It Taught Us About Trust

Comments
4 min read
Network Security Tips For Small Business

Network Security Tips For Small Business

Comments
4 min read
loading...