Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Found a Second Layer to a GitHub Follow Botnet?

Found a Second Layer to a GitHub Follow Botnet?

1
Comments
17 min read
I automated PDF generation for 1,600 security guides — WeasyPrint lessons

I automated PDF generation for 1,600 security guides — WeasyPrint lessons

Comments
4 min read
Automate LLM Red Team Campaigns with PyRIT

Automate LLM Red Team Campaigns with PyRIT

Comments
4 min read
I built a search engine over 1,600+ cybersecurity articles — here's what I actually learned

I built a search engine over 1,600+ cybersecurity articles — here's what I actually learned

1
Comments
4 min read
What It Actually Takes to Audit Aurora PostgreSQL on AWS
Cover image for What It Actually Takes to Audit Aurora PostgreSQL on AWS

What It Actually Takes to Audit Aurora PostgreSQL on AWS

Comments
7 min read
How a Single PDF Can Poison 100 RAG Systems: The Vulnerability We Aren't Talking About
Cover image for How a Single PDF Can Poison 100 RAG Systems: The Vulnerability We Aren't Talking About

How a Single PDF Can Poison 100 RAG Systems: The Vulnerability We Aren't Talking About

Comments
4 min read
Security Is Important. Automate It
Cover image for Security Is Important. Automate It

Security Is Important. Automate It

1
Comments
8 min read
System prompts are not a security boundary for AI agents

System prompts are not a security boundary for AI agents

1
Comments 1
2 min read
De CSRF a RCE: una visita web cuesta una shell en OpenYak

De CSRF a RCE: una visita web cuesta una shell en OpenYak

Comments
9 min read
NIS2 Article 21 in Azure: Implementing Network Security Controls with Terraform
Cover image for NIS2 Article 21 in Azure: Implementing Network Security Controls with Terraform

NIS2 Article 21 in Azure: Implementing Network Security Controls with Terraform

Comments
2 min read
Security Controls in Enterprise RAG: Keys, Audit Logs, and the Hierarchy That Prevents Role Elevation

Security Controls in Enterprise RAG: Keys, Audit Logs, and the Hierarchy That Prevents Role Elevation

Comments
5 min read
Microsoft Defender Zero-Days, GitHub Supply Chain Breaches, and Python Package Compromises

Microsoft Defender Zero-Days, GitHub Supply Chain Breaches, and Python Package Compromises

Comments
3 min read
CrimsonOS: Building a Mobile OS from the Firmware Up

CrimsonOS: Building a Mobile OS from the Firmware Up

Comments
2 min read
Building a transparent terminal-based proxy for Claude Code in Cursor (or any IDE)

Building a transparent terminal-based proxy for Claude Code in Cursor (or any IDE)

Comments
9 min read
Building a transparent terminal-based proxy for Claude Code in Cursor (or any IDE)

Building a transparent terminal-based proxy for Claude Code in Cursor (or any IDE)

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.