Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 48: Deploy AWS Lambda without ClickOps (Using GitHub Actions & OIDC)
Cover image for Day 48: Deploy AWS Lambda without ClickOps (Using GitHub Actions & OIDC)

Day 48: Deploy AWS Lambda without ClickOps (Using GitHub Actions & OIDC)

Comments
1 min read
Gilfoyle's AI Ordered 4,000 Pounds of Burgers. Yours Might Delete Production.

Gilfoyle's AI Ordered 4,000 Pounds of Burgers. Yours Might Delete Production.

Comments
2 min read
Course 3 of 3: AIOps ☁️💪
Cover image for Course 3 of 3: AIOps ☁️💪

Course 3 of 3: AIOps ☁️💪

Comments
6 min read
A Production Readiness Checklist for Remote MCP Servers

A Production Readiness Checklist for Remote MCP Servers

Comments
6 min read
Emotet + Cobalt Strike — Dissecting a Multi-Stage Attack in Wireshark

Emotet + Cobalt Strike — Dissecting a Multi-Stage Attack in Wireshark

Comments
4 min read
GHSA-CCGF-5RWJ-J3HV: GHSA-ccgf-5rwj-j3hv: DOM XSS via Unsafe Deserialization in TeleJSON

GHSA-CCGF-5RWJ-J3HV: GHSA-ccgf-5rwj-j3hv: DOM XSS via Unsafe Deserialization in TeleJSON

Comments
2 min read
WTFM — Write The F*cking Manual
Cover image for WTFM — Write The F*cking Manual

WTFM — Write The F*cking Manual

Comments
6 min read
Asqav vs Microsoft Agent Governance Toolkit - what is the difference

Asqav vs Microsoft Agent Governance Toolkit - what is the difference

Comments
2 min read
I built a free security CLI to catch malicious npm packages

I built a free security CLI to catch malicious npm packages

1
Comments 1
1 min read
From Grade F to A+: The Ultimate HTTP Security Headers Guide

From Grade F to A+: The Ultimate HTTP Security Headers Guide

Comments
2 min read
We Built AgenticSearch -- Not Ranked by Links. Ranked by Trust.

We Built AgenticSearch -- Not Ranked by Links. Ranked by Trust.

Comments
5 min read
Node.js Security Hardening in Production: OWASP Top 10 Implementation Guide

Node.js Security Hardening in Production: OWASP Top 10 Implementation Guide

1
Comments
8 min read
How the axios@1.14.1 supply chain attack worked (and how to protect yourself)

How the axios@1.14.1 supply chain attack worked (and how to protect yourself)

Comments
4 min read
Your AI Agent Just Sent an Email. Can You Prove It?

Your AI Agent Just Sent an Email. Can You Prove It?

Comments
4 min read
5 Java Spring Boot Security Mistakes That Are Costing You Time and Money

5 Java Spring Boot Security Mistakes That Are Costing You Time and Money

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.