Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity Tip: Never Open Suspicious Attachments—They Could Be a Gateway to Malware

Cybersecurity Tip: Never Open Suspicious Attachments—They Could Be a Gateway to Malware

Comments
1 min read
🛡️ Top 10 Free Penetration Testing Tools Every Security Team Should Use in 2025
Cover image for 🛡️ Top 10 Free Penetration Testing Tools Every Security Team Should Use in 2025

🛡️ Top 10 Free Penetration Testing Tools Every Security Team Should Use in 2025

1
Comments
3 min read
NIST CSF: Simple Guide to the Cybersecurity Framework

NIST CSF: Simple Guide to the Cybersecurity Framework

Comments
4 min read
Why Cybersecurity Should Be a Top Priority for Every Business

Why Cybersecurity Should Be a Top Priority for Every Business

Comments
3 min read
GitHub Pull Request Review Study

GitHub Pull Request Review Study

1
Comments
1 min read
What Hogwarts Can Teach Us About Security

What Hogwarts Can Teach Us About Security

Comments
2 min read
The logic of Value
Cover image for The logic of Value

The logic of Value

Comments
3 min read
5 Linux Hardening Techniques I Apply Before Hosting Any Website

5 Linux Hardening Techniques I Apply Before Hosting Any Website

Comments
2 min read
Recap of the Next.js Bug That Got Apps Hacked (And How to Protect Yours)

Recap of the Next.js Bug That Got Apps Hacked (And How to Protect Yours)

1
Comments
2 min read
How To Add Simple Download Verification for Your Users

How To Add Simple Download Verification for Your Users

5
Comments
2 min read
Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions
Cover image for Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

3
Comments
3 min read
Shellfirm: Your Terminal's New Best Friend (and Accidental Data Loss Savior!)
Cover image for Shellfirm: Your Terminal's New Best Friend (and Accidental Data Loss Savior!)

Shellfirm: Your Terminal's New Best Friend (and Accidental Data Loss Savior!)

Comments
2 min read
Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

6
Comments
2 min read
(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"
Cover image for (Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

Comments
1 min read
Beware of Interview Scams!

Beware of Interview Scams!

1
Comments 1
3 min read
Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍
Cover image for Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍

Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍

Comments
6 min read
Hacked Without Touching Your Phone!
Cover image for Hacked Without Touching Your Phone!

Hacked Without Touching Your Phone!

6
Comments
3 min read
Fail-Safe PII Redaction in Elixir
Cover image for Fail-Safe PII Redaction in Elixir

Fail-Safe PII Redaction in Elixir

2
Comments 1
3 min read
What is a WAF? Why and When Do You Need a WAF?

What is a WAF? Why and When Do You Need a WAF?

8
Comments
2 min read
Adding HTTPS to django app on VM(Windows OS) Production level

Adding HTTPS to django app on VM(Windows OS) Production level

Comments
1 min read
How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device
Cover image for How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device

How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device

Comments
2 min read
EnvShare - A secured, Role-based Access way to share .env file

EnvShare - A secured, Role-based Access way to share .env file

14
Comments 1
2 min read
Lubyc: Your Ultimate AI Business Platform in 2025

Lubyc: Your Ultimate AI Business Platform in 2025

Comments
2 min read
Security news weekly round-up - 25th April 2025
Cover image for Security news weekly round-up - 25th April 2025

Security news weekly round-up - 25th April 2025

2
Comments
3 min read
Create AES on C/JAVA || Forward S-box (first part)

Create AES on C/JAVA || Forward S-box (first part)

20
Comments 2
4 min read
loading...