Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
My Experience Fixing clasp Login Errors on Google Workspace

My Experience Fixing clasp Login Errors on Google Workspace

Comments
4 min read
Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall
Cover image for Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Comments
3 min read
From a Single Container to a Secure Application Stack: A Practical Guide to Docker and Server Hardening

From a Single Container to a Secure Application Stack: A Practical Guide to Docker and Server Hardening

Comments
5 min read
Adversarial Attacks on Generative AI: A Growing Concern in the AI Era
Cover image for Adversarial Attacks on Generative AI: A Growing Concern in the AI Era

Adversarial Attacks on Generative AI: A Growing Concern in the AI Era

1
Comments
4 min read
Offensive security - Testing for Broken Access Control (OWASP)
Cover image for Offensive security - Testing for Broken Access Control (OWASP)

Offensive security - Testing for Broken Access Control (OWASP)

Comments
1 min read
Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)
Cover image for Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)

Not a VPN: A Two-Peer RAM-Only Tunnel (Cluddy)

Comments
4 min read
Prompt Chainmail: Security middleware for AI applications
Cover image for Prompt Chainmail: Security middleware for AI applications

Prompt Chainmail: Security middleware for AI applications

1
Comments 3
4 min read
Gateway-Oriented Architecture (GOA)

Gateway-Oriented Architecture (GOA)

Comments
3 min read
GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits
Cover image for GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

5
Comments
19 min read
Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews
Cover image for Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Comments
3 min read
Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Comments
1 min read
Logs Fundamentals for Cybersecurity: What Every Analyst Should Know
Cover image for Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Comments
10 min read
Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch
Cover image for Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Comments
3 min read
🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy
Cover image for 🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy

🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy

Comments
2 min read
Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

3
Comments 1
8 min read
Security news weekly round-up - 5th September 2025
Cover image for Security news weekly round-up - 5th September 2025

Security news weekly round-up - 5th September 2025

1
Comments
2 min read
Building Own Stream Cipher: Part 2 - RC4: From Ubiquity to Collapse and What It Taught Us About Trust
Cover image for Building Own Stream Cipher: Part 2 - RC4: From Ubiquity to Collapse and What It Taught Us About Trust

Building Own Stream Cipher: Part 2 - RC4: From Ubiquity to Collapse and What It Taught Us About Trust

Comments
4 min read
Network Security Tips For Small Business

Network Security Tips For Small Business

Comments
4 min read
Cloud Resume Challenge - Chunk 0 - Access, Credentials, and Certification Prep
Cover image for Cloud Resume Challenge - Chunk 0 - Access, Credentials, and Certification Prep

Cloud Resume Challenge - Chunk 0 - Access, Credentials, and Certification Prep

1
Comments
3 min read
How the Tea App Got Hacked: Firebase Pitfalls and Lessons for Engineers
Cover image for How the Tea App Got Hacked: Firebase Pitfalls and Lessons for Engineers

How the Tea App Got Hacked: Firebase Pitfalls and Lessons for Engineers

Comments
8 min read
Is Open Banking Built To Last?
Cover image for Is Open Banking Built To Last?

Is Open Banking Built To Last?

23
Comments 1
7 min read
Building a Cost-Efficient Game Launcher with AWS Pre-Signed URLs
Cover image for Building a Cost-Efficient Game Launcher with AWS Pre-Signed URLs

Building a Cost-Efficient Game Launcher with AWS Pre-Signed URLs

Comments 1
5 min read
OneTerm: The Open-Source Bastion Host I Refactored in Three Months
Cover image for OneTerm: The Open-Source Bastion Host I Refactored in Three Months

OneTerm: The Open-Source Bastion Host I Refactored in Three Months

Comments
3 min read
NISTIR 8286 Makes Cybersecurity Easier to Understand and Manage

NISTIR 8286 Makes Cybersecurity Easier to Understand and Manage

Comments
2 min read
Using NISTIR 8286 Without the Jargon

Using NISTIR 8286 Without the Jargon

Comments
2 min read
loading...