Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🚨 TypeORM Hook Gotcha: Password Not Hashing! 🚨
Cover image for 🚨 TypeORM Hook Gotcha: Password Not Hashing! 🚨

🚨 TypeORM Hook Gotcha: Password Not Hashing! 🚨

1
Comments 1
1 min read
Concerning Amounts of Malware in the VS Code Marketplace: What Microsoft’s Own Logs Reveal
Cover image for Concerning Amounts of Malware in the VS Code Marketplace: What Microsoft’s Own Logs Reveal

Concerning Amounts of Malware in the VS Code Marketplace: What Microsoft’s Own Logs Reveal

12
Comments
3 min read
Sanctum: Cryptographically Deniable Vault System with IPFS Storage

Sanctum: Cryptographically Deniable Vault System with IPFS Storage

Comments
5 min read
Logging Into EC2 Is Easy… Until You Pick the Wrong Way
Cover image for Logging Into EC2 Is Easy… Until You Pick the Wrong Way

Logging Into EC2 Is Easy… Until You Pick the Wrong Way

1
Comments
3 min read
Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work
Cover image for Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work

Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work

Comments
3 min read
Implementing Security Lake in AWS GovCloud for FedRAMP High Compliance

Implementing Security Lake in AWS GovCloud for FedRAMP High Compliance

1
Comments
11 min read
I was tired of copying .env files between machines, so we built a CLI

I was tired of copying .env files between machines, so we built a CLI

Comments
1 min read
Browser-Based kubectl Access: Managing Kubernetes Without Bastion Hosts
Cover image for Browser-Based kubectl Access: Managing Kubernetes Without Bastion Hosts

Browser-Based kubectl Access: Managing Kubernetes Without Bastion Hosts

Comments
4 min read
Offline License Activation with QR Codes: Serving Air-Gapped Environments in C#

Offline License Activation with QR Codes: Serving Air-Gapped Environments in C#

Comments
11 min read
Basic protections for your S3 buckets

Basic protections for your S3 buckets

Comments
5 min read
React2Shell Aftermath: Analyzing the Critical Prototype Pollution Vulnerability in React Server Components

React2Shell Aftermath: Analyzing the Critical Prototype Pollution Vulnerability in React Server Components

Comments
2 min read
Memory-Safe Secrets in .NET Configuration
Cover image for Memory-Safe Secrets in .NET Configuration

Memory-Safe Secrets in .NET Configuration

Comments
9 min read
Why WebAuthn Feels Easy — Until You Try to Ship It

Why WebAuthn Feels Easy — Until You Try to Ship It

Comments
2 min read
Most “Private” Apps Still Leak More Than You Think
Cover image for Most “Private” Apps Still Leak More Than You Think

Most “Private” Apps Still Leak More Than You Think

Comments
2 min read
The Future of IaC Security: Scanning, Drift Detection and Autoremediation
Cover image for The Future of IaC Security: Scanning, Drift Detection and Autoremediation

The Future of IaC Security: Scanning, Drift Detection and Autoremediation

Comments
6 min read
Your Teams Are Already Vibe Coding. Here's How to Capture the Value.
Cover image for Your Teams Are Already Vibe Coding. Here's How to Capture the Value.

Your Teams Are Already Vibe Coding. Here's How to Capture the Value.

Comments
7 min read
HealthTech API Security: Protecting Patient Data with mTLS and OAuth 2.0

HealthTech API Security: Protecting Patient Data with mTLS and OAuth 2.0

Comments
3 min read
Building a Fail-Closed Investment Risk Gate with Yuer DSL

Building a Fail-Closed Investment Risk Gate with Yuer DSL

Comments
3 min read
Passkey Login & Smart Wallet Creation on Solana with React Native and LazorKit — No More Seed Phrases!

Passkey Login & Smart Wallet Creation on Solana with React Native and LazorKit — No More Seed Phrases!

Comments
9 min read
AWS Bedrock Security Best Practices: Building Secure Generative AI Applications
Cover image for AWS Bedrock Security Best Practices: Building Secure Generative AI Applications

AWS Bedrock Security Best Practices: Building Secure Generative AI Applications

Comments
4 min read
I Accidentally Exposed My API Keys to 50,000 Users (And How You Can Avoid My $3,000 Mistake)
Cover image for I Accidentally Exposed My API Keys to 50,000 Users (And How You Can Avoid My $3,000 Mistake)

I Accidentally Exposed My API Keys to 50,000 Users (And How You Can Avoid My $3,000 Mistake)

Comments
5 min read
Don't Trust the Client: How I Hacked My Own Coupon System

Don't Trust the Client: How I Hacked My Own Coupon System

Comments
2 min read
Why cookies are unreliable for identifying users

Why cookies are unreliable for identifying users

Comments
2 min read
Data Security in Salesforce: Understanding the Layers That Protect Your Data
Cover image for Data Security in Salesforce: Understanding the Layers That Protect Your Data

Data Security in Salesforce: Understanding the Layers That Protect Your Data

Comments
8 min read
Why Rust?

Why Rust?

1
Comments
3 min read
loading...