Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Non-functional Application Requirements: Security

Non-functional Application Requirements: Security

5
Comments
9 min read
Self-taught Front-End Dev seeking to grow network

Self-taught Front-End Dev seeking to grow network

Comments
1 min read
Don’t Let Your Code Become the Titanic

Don’t Let Your Code Become the Titanic

Comments
4 min read
What is Rate Limiter and Why Use It?

What is Rate Limiter and Why Use It?

7
Comments
5 min read
AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

3
Comments
3 min read
Applying Amazon GuardDuty S3 Malware Protection at Scale in Multi-Account Environments

Applying Amazon GuardDuty S3 Malware Protection at Scale in Multi-Account Environments

Comments
5 min read
Hacking My Own AWS Account: A Tale of Legacy Systems and Modern Solutions

Hacking My Own AWS Account: A Tale of Legacy Systems and Modern Solutions

2
Comments
3 min read
Ditana GNU/Linux: Unmatched Configuration Flexibility and Generic Hardware Detection

Ditana GNU/Linux: Unmatched Configuration Flexibility and Generic Hardware Detection

Comments
6 min read
Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Comments
2 min read
How to Protect Your Cloud Infrastructure from DDoS Attacks

How to Protect Your Cloud Infrastructure from DDoS Attacks

Comments
5 min read
PSA: Add the following to your Vercel project's firewall

PSA: Add the following to your Vercel project's firewall

2
Comments
1 min read
Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
These are the Ghost Engineers that you want

These are the Ghost Engineers that you want

Comments
2 min read
OverFlow and UnderFlow causes in Solidity

OverFlow and UnderFlow causes in Solidity

Comments
1 min read
Importando certificado SSL no cacerts, via KeyStore Explorer

Importando certificado SSL no cacerts, via KeyStore Explorer

Comments
1 min read
Automate AWS Landing Zone Deployment

Automate AWS Landing Zone Deployment

Comments
9 min read
New AWS WAF Feature: Top Insights Visualizations 02:37

New AWS WAF Feature: Top Insights Visualizations

1
Comments
1 min read
Rails GraphQL Auth - JWT, Email & Security

Rails GraphQL Auth - JWT, Email & Security

Comments
4 min read
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨

OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨

Comments
5 min read
OverFlow and UnderFlow causes in Solidity

OverFlow and UnderFlow causes in Solidity

Comments
1 min read
Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

6
Comments
2 min read
Introduction to Waffle: In-app WAF for Go Applications

Introduction to Waffle: In-app WAF for Go Applications

Comments
6 min read
Permission-Based Authentication and Authorization in .NET, via Cookies

Permission-Based Authentication and Authorization in .NET, via Cookies

Comments
13 min read
Why is GRC Important in 2025?

Why is GRC Important in 2025?

Comments
3 min read
Why Authorization Matters and How Cerbos Revolutionizes It

Why Authorization Matters and How Cerbos Revolutionizes It

Comments
5 min read
Security as the foundation of digital sovereignty

Security as the foundation of digital sovereignty

Comments
4 min read
Secrets Management & Security: Hashicorp Vault

Secrets Management & Security: Hashicorp Vault

Comments
3 min read
Security news weekly round-up - 3rd January 2025

Security news weekly round-up - 3rd January 2025

1
Comments
3 min read
Malware: Your Ultimate Guide to Protecting Your System!

Malware: Your Ultimate Guide to Protecting Your System!

Comments
2 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
10 Ways To Secure Docker Images: Best Strategies

10 Ways To Secure Docker Images: Best Strategies

4
Comments
4 min read
Ep. 1: Cybersecurity Essentials – Vulnerability Management 101

Ep. 1: Cybersecurity Essentials – Vulnerability Management 101

Comments
6 min read
Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
How-to deploy GuardDuty from dedicated account on multi-accounts and multi-regions organization

How-to deploy GuardDuty from dedicated account on multi-accounts and multi-regions organization

Comments
2 min read
ShadowStrike: A Modern DDoS Testing Tool for Website Security

ShadowStrike: A Modern DDoS Testing Tool for Website Security

3
Comments
2 min read
Antivirus in C++

Antivirus in C++

Comments
1 min read
Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

1
Comments
2 min read
Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)

Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)

3
Comments
3 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
Discover Java’s Top 10 Security Features

Discover Java’s Top 10 Security Features

1
Comments 2
4 min read
Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

Comments
3 min read
MitM Attacks in Laravel: Prevention and Coding Examples

MitM Attacks in Laravel: Prevention and Coding Examples

2
Comments
3 min read
How to Write Test Cases for OTP Verification

How to Write Test Cases for OTP Verification

Comments
6 min read
Enhance Your App's Security with OTP-Agent

Enhance Your App's Security with OTP-Agent

Comments
2 min read
Buckets? No, S3 buckets

Buckets? No, S3 buckets

Comments
3 min read
Configuring AWS Vault with the Pass Backend for Secure Credential Management on Linux

Configuring AWS Vault with the Pass Backend for Secure Credential Management on Linux

Comments
4 min read
Hashicorp Vault Agent Tutorial: Generating .env from Vault Secrets

Hashicorp Vault Agent Tutorial: Generating .env from Vault Secrets

Comments
3 min read
6 Essential WebRTC Security Best Practices for 2025

6 Essential WebRTC Security Best Practices for 2025

Comments
6 min read
The Journey of ReqWeb: What’s Coming in Version 2.0

The Journey of ReqWeb: What’s Coming in Version 2.0

Comments
3 min read
Deploy Vaultwarden Password Manager to Dokku Micro PaaS

Deploy Vaultwarden Password Manager to Dokku Micro PaaS

Comments
1 min read
Security news weekly round-up - 27th December 2024

Security news weekly round-up - 27th December 2024

Comments
4 min read
AWS Security - Secure Users

AWS Security - Secure Users

Comments
1 min read
Renew LetsEncrypt SSL Certificate in WordPress by Bitnami

Renew LetsEncrypt SSL Certificate in WordPress by Bitnami

5
Comments
2 min read
Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Comments
39 min read
The Strange Behavior of The Empty Default Privileges on PostgreSQL

The Strange Behavior of The Empty Default Privileges on PostgreSQL

Comments
6 min read
Encryption: ciphers, digests, salt, IV

Encryption: ciphers, digests, salt, IV

Comments
11 min read
loading...