Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Amass API - REST API Solution for Domain Reconnaissance

Amass API - REST API Solution for Domain Reconnaissance

Comments
2 min read
Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

Comments
1 min read
Microsoft Security: A Comprehensive Approach to Digital Protection

Microsoft Security: A Comprehensive Approach to Digital Protection

Comments
3 min read
HashiCorp Vault Setup Guide for NEAR Protocol Accounts

HashiCorp Vault Setup Guide for NEAR Protocol Accounts

Comments
4 min read
Issue 79 of AWS Cloud Security Weekly

Issue 79 of AWS Cloud Security Weekly

Comments
1 min read
Top 7 Kubernetes Certifications in 2025

Top 7 Kubernetes Certifications in 2025

Comments
2 min read
NPM command confusion

NPM command confusion

Comments
2 min read
Secrets Management in Kubernetes: Best Practices for Security

Secrets Management in Kubernetes: Best Practices for Security

12
Comments
6 min read
Can a Website Be Hacked in Under 10 Minutes? Understanding Web Security

Can a Website Be Hacked in Under 10 Minutes? Understanding Web Security

Comments
3 min read
Don't use JWT for Authorization!

Don't use JWT for Authorization!

1
Comments
4 min read
Securely access Amazon EKS with GitHub Actions and OpenID Connect

Securely access Amazon EKS with GitHub Actions and OpenID Connect

1
Comments
3 min read
Closing the PKIX Working Group is, apparently, not news

Closing the PKIX Working Group is, apparently, not news

Comments
2 min read
Beyond the Random Class: Cryptographic Randomness in .NET 6+

Beyond the Random Class: Cryptographic Randomness in .NET 6+

Comments
7 min read
Enhance Your App's Security with OTP-Agent

Enhance Your App's Security with OTP-Agent

Comments
2 min read
Patching Scheduled Auto Scaling Groups with AWS

Patching Scheduled Auto Scaling Groups with AWS

Comments
5 min read
3Mór: How we started with Valkyries and ended with a Goddess

3Mór: How we started with Valkyries and ended with a Goddess

1
Comments
2 min read
Como configurar 2FA em Servidores Linux

Como configurar 2FA em Servidores Linux

Comments
3 min read
Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Comments
6 min read
Building a Stronger Security Posture with AWS Security Hub

Building a Stronger Security Posture with AWS Security Hub

Comments
6 min read
[jan2025] thm.jrpt-path. 3/n

[jan2025] thm.jrpt-path. 3/n

Comments
1 min read
Certificate Generation using OpenSSL locally

Certificate Generation using OpenSSL locally

Comments
2 min read
Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform

Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform

Comments
4 min read
How to truncate CBC ciphertext

How to truncate CBC ciphertext

Comments
8 min read
Cyber skill chain

Cyber skill chain

1
Comments
5 min read
Auditing SQL Server Database Users, Logins, and Activity: A Comprehensive Guide

Auditing SQL Server Database Users, Logins, and Activity: A Comprehensive Guide

Comments
3 min read
Getting Started With Cerbos

Getting Started With Cerbos

Comments
7 min read
Top DevSecOps Tools for 2025

Top DevSecOps Tools for 2025

6
Comments
3 min read
Best Practices for Securing REST APIs: Balancing Performance, Usability, and Security

Best Practices for Securing REST APIs: Balancing Performance, Usability, and Security

Comments
7 min read
How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

Comments
7 min read
The Speakeasy Door to Your Network - Port Knocking (1)

The Speakeasy Door to Your Network - Port Knocking (1)

Comments
3 min read
The Speakeasy Door to Your Network - Port Knocking (2)

The Speakeasy Door to Your Network - Port Knocking (2)

Comments
4 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 3

Migrando Aplicativos de uma Nuvem para Outra - Parte 3

Comments
3 min read
SSO Gone Wrong: Insights from a Real Breach

SSO Gone Wrong: Insights from a Real Breach

2
Comments
4 min read
Tools Dependency Injection

Tools Dependency Injection

6
Comments
7 min read
"5 Pro Tips to Secure Your AWS S3 Buckets Like an Expert 🔒"

"5 Pro Tips to Secure Your AWS S3 Buckets Like an Expert 🔒"

Comments
2 min read
Fix Insufficient Logging & Monitoring in Laravel Easily

Fix Insufficient Logging & Monitoring in Laravel Easily

2
Comments
3 min read
Understanding Passkeys: The Behind-the-Scenes Magic of Passwordless Authentication

Understanding Passkeys: The Behind-the-Scenes Magic of Passwordless Authentication

Comments
2 min read
Event Recap: OWASP Atlanta Meetup – The State of Secure Code + Tournament

Event Recap: OWASP Atlanta Meetup – The State of Secure Code + Tournament

Comments
2 min read
How I automated Certificate expiration alerts with AWS

How I automated Certificate expiration alerts with AWS

5
Comments
5 min read
Custom Middleware Extensions in .NET Core Web API

Custom Middleware Extensions in .NET Core Web API

1
Comments
3 min read
Professional TypeScript: Improve Type Safety with Branded Types

Professional TypeScript: Improve Type Safety with Branded Types

Comments
5 min read
Managing Sensitive Data in Kubernetes: A Comprehensive Guide to K8s Secrets

Managing Sensitive Data in Kubernetes: A Comprehensive Guide to K8s Secrets

Comments
3 min read
Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Comments
3 min read
Securing Amazon Redshift - Best Practices for Access Control

Securing Amazon Redshift - Best Practices for Access Control

1
Comments
9 min read
My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how

My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how

Comments
2 min read
Self-taught Front-End Dev seeking to grow network

Self-taught Front-End Dev seeking to grow network

Comments
1 min read
Implementing Kubernetes Security with Kyverno: A Journey Through Resource Management

Implementing Kubernetes Security with Kyverno: A Journey Through Resource Management

1
Comments
2 min read
Don’t Let Your Code Become the Titanic

Don’t Let Your Code Become the Titanic

Comments
4 min read
Master Secure File Uploads to AWS S3 in Node.js with Express and Multer

Master Secure File Uploads to AWS S3 in Node.js with Express and Multer

4
Comments
6 min read
Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Comments
2 min read
How to Protect Your Cloud Infrastructure from DDoS Attacks

How to Protect Your Cloud Infrastructure from DDoS Attacks

Comments
5 min read
Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
Event Recap: SOSS: Fusion Conference

Event Recap: SOSS: Fusion Conference

Comments
2 min read
Importando certificado SSL no cacerts, via KeyStore Explorer

Importando certificado SSL no cacerts, via KeyStore Explorer

Comments
1 min read
New AWS WAF Feature: Top Insights Visualizations 02:37

New AWS WAF Feature: Top Insights Visualizations

1
Comments
1 min read
Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

2
Comments
16 min read
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨

OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨

Comments
5 min read
loading...