Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Deal with MCP “Tool Poisoning”

How to Deal with MCP “Tool Poisoning”

Comments
17 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
How to use Testcontainers with PostgreSQL and SSL
Cover image for How to use Testcontainers with PostgreSQL and SSL

How to use Testcontainers with PostgreSQL and SSL

Comments
6 min read
No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience
Cover image for No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

Comments
7 min read
📰 Major Tech News: Oct 14th, 2025
Cover image for 📰 Major Tech News: Oct 14th, 2025

📰 Major Tech News: Oct 14th, 2025

24
Comments 2
5 min read
Cloud Pen Testing Strategies (Azure, AWS)

Cloud Pen Testing Strategies (Azure, AWS)

Comments
5 min read
Automatic deployment via SSH

Automatic deployment via SSH

Comments
2 min read
Secrets Management: Keeping API Keys and Credentials Safe
Cover image for Secrets Management: Keeping API Keys and Credentials Safe

Secrets Management: Keeping API Keys and Credentials Safe

4
Comments
2 min read
Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Comments
2 min read
I spent a week building OAuth Plumbing that shouldn't exist

I spent a week building OAuth Plumbing that shouldn't exist

1
Comments
4 min read
How RSA Works (for Dummies)

How RSA Works (for Dummies)

Comments 2
4 min read
Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

5
Comments
2 min read
AI SAST vs AI DAST: Friends or Foes? Building a Comprehensive Testing Strategy

AI SAST vs AI DAST: Friends or Foes? Building a Comprehensive Testing Strategy

6
Comments
3 min read
GitHub Actions: Why You Should Pin Your Actions to a Specific Version

GitHub Actions: Why You Should Pin Your Actions to a Specific Version

4
Comments 1
4 min read
Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

1
Comments
4 min read
Selecting the appropriate Docker base image
Cover image for Selecting the appropriate Docker base image

Selecting the appropriate Docker base image

8
Comments
4 min read
How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !
Cover image for How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

2
Comments
4 min read
Best Secret Scanning Tools for 2025: What Every Developer Needs to Know
Cover image for Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

6
Comments
3 min read
🚫Never Use finalize() in Java

🚫Never Use finalize() in Java

3
Comments
3 min read
The Silent Thief in Your Code: When AI Assistants Get Hacked

The Silent Thief in Your Code: When AI Assistants Get Hacked

Comments
2 min read
Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso
Cover image for Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Comments
9 min read
Why I Built a Free Security Scanner That Makes Sense
Cover image for Why I Built a Free Security Scanner That Makes Sense

Why I Built a Free Security Scanner That Makes Sense

4
Comments 1
5 min read
Deploying a Honeypot SOC with Microsoft Sentinel

Deploying a Honeypot SOC with Microsoft Sentinel

1
Comments
3 min read
Smart Fuzzing: How AI is Automating JavaScript Bug Hunts

Smart Fuzzing: How AI is Automating JavaScript Bug Hunts

Comments
2 min read
Why the Principle of Least Privilege Is Critical for Non-Human Identities
Cover image for Why the Principle of Least Privilege Is Critical for Non-Human Identities

Why the Principle of Least Privilege Is Critical for Non-Human Identities

Comments
7 min read
loading...