Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
xmrwallet.com Scam: How NameSilo Became the Press Secretary for a $2M Monero Theft Operation
Cover image for xmrwallet.com Scam: How NameSilo Became the Press Secretary for a $2M Monero Theft Operation

xmrwallet.com Scam: How NameSilo Became the Press Secretary for a $2M Monero Theft Operation

1
Comments
13 min read
I built an AI operating system because every project I touched was lying to me
Cover image for I built an AI operating system because every project I touched was lying to me

I built an AI operating system because every project I touched was lying to me

1
Comments
4 min read
Your Agent's Identity Now Belongs to Meta. Here's the Open Alternative.

Your Agent's Identity Now Belongs to Meta. Here's the Open Alternative.

1
Comments
3 min read
Remediating Critical Security Vulnerabilities in Outdated .NET Application Within One Week for Audit Compliance

Remediating Critical Security Vulnerabilities in Outdated .NET Application Within One Week for Audit Compliance

1
Comments
15 min read
Anatomy of the Solv Protocol Hack: How ERC-3525 Reentrancy Drained $2.7M

Anatomy of the Solv Protocol Hack: How ERC-3525 Reentrancy Drained $2.7M

Comments
4 min read
The UK Government Just Warned About Vibe Coding Security at RSA. Two Days Later, a Supply Chain Attack Proved Why.

The UK Government Just Warned About Vibe Coding Security at RSA. Two Days Later, a Supply Chain Attack Proved Why.

1
Comments
4 min read
The Third Reason for Edge AI: Law

The Third Reason for Edge AI: Law

Comments
5 min read
The Era of "Short-Lived" SSL Certificates: A New Chapter in Web Security Begins
Cover image for The Era of "Short-Lived" SSL Certificates: A New Chapter in Web Security Begins

The Era of "Short-Lived" SSL Certificates: A New Chapter in Web Security Begins

Comments
2 min read
EPSS Explained: Why Exploit Prediction Scoring Changes Everything for Vulnerability Prioritization

EPSS Explained: Why Exploit Prediction Scoring Changes Everything for Vulnerability Prioritization

Comments
2 min read
How to Securely Store and Use API Keys in Laravel in 2026
Cover image for How to Securely Store and Use API Keys in Laravel in 2026

How to Securely Store and Use API Keys in Laravel in 2026

1
Comments
3 min read
Google paid me $15,000 for this Prompt Injection bug.

Google paid me $15,000 for this Prompt Injection bug.

1
Comments
3 min read
I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing

I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing

1
Comments
2 min read
Ditch `authorized_keys` Sprawl: SSH User Certificates with OpenSSH CA (Practical Linux Guide)

Ditch `authorized_keys` Sprawl: SSH User Certificates with OpenSSH CA (Practical Linux Guide)

Comments
4 min read
Forging the Unforgivable: How a zkSNARK Verification Key Misconfiguration Drained $2.26M from FOOMCASH

Forging the Unforgivable: How a zkSNARK Verification Key Misconfiguration Drained $2.26M from FOOMCASH

Comments
6 min read
Understanding OAuth2 Flow with a Complete Java Servlet Demo (Step-by-Step)
Cover image for Understanding OAuth2 Flow with a Complete Java Servlet Demo (Step-by-Step)

Understanding OAuth2 Flow with a Complete Java Servlet Demo (Step-by-Step)

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.