Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SQL Injection: A Deep Dive into a Persistent Vulnerability

SQL Injection: A Deep Dive into a Persistent Vulnerability

Comments
4 min read
How to Avoid Triggering Preflight Requests

How to Avoid Triggering Preflight Requests

1
Comments
2 min read
Replit GenAI Security Scans and Shadow AI

Replit GenAI Security Scans and Shadow AI

1
Comments
5 min read
Mastering Generative AI: Strategic Integration for Enhanced Collaboration and Productivity

Mastering Generative AI: Strategic Integration for Enhanced Collaboration and Productivity

Comments
6 min read
Data Security & Authorization: The Dual Pillars of a Robust Database System

Data Security & Authorization: The Dual Pillars of a Robust Database System

Comments
2 min read
How Certificate-Based Authentication Works: Explained with CAS++ and Smart Cards

How Certificate-Based Authentication Works: Explained with CAS++ and Smart Cards

Comments
1 min read
🔐 Still storing JWT in LocalStorage? Time to stop — here’s the 2025 way

🔐 Still storing JWT in LocalStorage? Time to stop — here’s the 2025 way

Comments
1 min read
🔍 TLS Debugging, Demystified: See Inside Encrypted Traffic in Seconds

🔍 TLS Debugging, Demystified: See Inside Encrypted Traffic in Seconds

Comments
1 min read
How to Translate Documents Online Securely and Accurately: A Complete Guide

How to Translate Documents Online Securely and Accurately: A Complete Guide

Comments
3 min read
🔐 DevSecOps 2025: One Loop to Catch Them All

🔐 DevSecOps 2025: One Loop to Catch Them All

Comments
1 min read
🛑 Still in the disk group? You’re one command from root.

🛑 Still in the disk group? You’re one command from root.

Comments
1 min read
Security Essentials Every Developer Should Know

Security Essentials Every Developer Should Know

1
Comments 1
3 min read
Supply Chain Attacks: The Silent Killer with THM Nagpur

Supply Chain Attacks: The Silent Killer with THM Nagpur

5
Comments
4 min read
Troubleshooting ERR_SSL_PROTOCOL_ERROR in Chrome & Android Devices

Troubleshooting ERR_SSL_PROTOCOL_ERROR in Chrome & Android Devices

Comments
4 min read
Revolutionizing Software Security: How Generative AI is Reshaping Threat Modeling

Revolutionizing Software Security: How Generative AI is Reshaping Threat Modeling

1
Comments
7 min read
Unlocking Privacy: Tackling PETs Adoption Challenges for Enterprises

Unlocking Privacy: Tackling PETs Adoption Challenges for Enterprises

1
Comments
6 min read
Is Blockchain Really Secure?

Is Blockchain Really Secure?

Comments 5
5 min read
May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

Comments
4 min read
API Security Best Practices to Protect Digital Ecosystems

API Security Best Practices to Protect Digital Ecosystems

2
Comments
8 min read
How to secure your server. Easy follow-up steps

How to secure your server. Easy follow-up steps

1
Comments
5 min read
Generative AI: The Double-Edged Sword in Cloud-Native Security

Generative AI: The Double-Edged Sword in Cloud-Native Security

1
Comments
9 min read
Always Winning at Juwenalia: Hacking Rewards from the Festival App's Mini-Games

Always Winning at Juwenalia: Hacking Rewards from the Festival App's Mini-Games

Comments
6 min read
UFW(Uncomplicated Firewall)

UFW(Uncomplicated Firewall)

1
Comments
2 min read
Transforming Industry: The 5G & AI Convergence in IIoT

Transforming Industry: The 5G & AI Convergence in IIoT

2
Comments
6 min read
🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

5
Comments 1
3 min read
loading...