Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
5 Security Checks Every Developer Should Do Before Shipping
Cover image for 5 Security Checks Every Developer Should Do Before Shipping

5 Security Checks Every Developer Should Do Before Shipping

Comments
3 min read
Security news weekly round-up - 27th June 2025
Cover image for Security news weekly round-up - 27th June 2025

Security news weekly round-up - 27th June 2025

1
Comments
3 min read
I Passed CompTIA Security+ (SY0-701)! Here’s How It Went
Cover image for I Passed CompTIA Security+ (SY0-701)! Here’s How It Went

I Passed CompTIA Security+ (SY0-701)! Here’s How It Went

Comments
3 min read
Claude Learns to Blackmail? : Anthropic's Research
Cover image for Claude Learns to Blackmail? : Anthropic's Research

Claude Learns to Blackmail? : Anthropic's Research

5
Comments
2 min read
🔐 Frontend Security Best Practices Every Developer Should Know
Cover image for 🔐 Frontend Security Best Practices Every Developer Should Know

🔐 Frontend Security Best Practices Every Developer Should Know

Comments
4 min read
AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.
Cover image for AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

1
Comments
2 min read
Unlocking Peak Performance & Fortifying Security: A Developer's Guide to HP Servers

Unlocking Peak Performance & Fortifying Security: A Developer's Guide to HP Servers

1
Comments 1
3 min read
Mobile App Fraud Prevention in 2025: Hard Numbers, Real Lessons
Cover image for Mobile App Fraud Prevention in 2025: Hard Numbers, Real Lessons

Mobile App Fraud Prevention in 2025: Hard Numbers, Real Lessons

1
Comments 1
2 min read
Understanding Android Screen Pinning: What It Is and Why You Might Need It
Cover image for Understanding Android Screen Pinning: What It Is and Why You Might Need It

Understanding Android Screen Pinning: What It Is and Why You Might Need It

Comments
2 min read
Don't Get Rate-Limited: Use Let's Encrypt Staging
Cover image for Don't Get Rate-Limited: Use Let's Encrypt Staging

Don't Get Rate-Limited: Use Let's Encrypt Staging

21
Comments 13
3 min read
AWS User Group Chennai Meetup - Session 2: Handle 100x Your Web Traffic Edge Services
Cover image for AWS User Group Chennai Meetup - Session 2: Handle 100x Your Web Traffic Edge Services

AWS User Group Chennai Meetup - Session 2: Handle 100x Your Web Traffic Edge Services

2
Comments
4 min read
VSCode Extensions are Malicious—Here's What I Found After Scanning 1,000 of Them
Cover image for VSCode Extensions are Malicious—Here's What I Found After Scanning 1,000 of Them

VSCode Extensions are Malicious—Here's What I Found After Scanning 1,000 of Them

36
Comments
3 min read
Introduction to Cryptography: Perfect secrecy
Cover image for Introduction to Cryptography: Perfect secrecy

Introduction to Cryptography: Perfect secrecy

Comments
10 min read
Who are your MCP servers talking to?
Cover image for Who are your MCP servers talking to?

Who are your MCP servers talking to?

10
Comments
4 min read
Why Node.js SEA Is (Still) Bad for Source Code Protection

Why Node.js SEA Is (Still) Bad for Source Code Protection

Comments
1 min read
Unlock Enterprise Power with Windows Server 2025 Data Center (16 Core)

Unlock Enterprise Power with Windows Server 2025 Data Center (16 Core)

Comments
4 min read
Empower Your Business with Microsoft 365 E3: Productivity Meets Security

Empower Your Business with Microsoft 365 E3: Productivity Meets Security

Comments
3 min read
Malicious npm Package Impersonating Popular Express Cookie Parser

Malicious npm Package Impersonating Popular Express Cookie Parser

Comments
7 min read
Weird PR for Python Base Docker Image, do not know how to read it

Weird PR for Python Base Docker Image, do not know how to read it

Comments 2
1 min read
rustzen-admin: Complete Declarative Permission System Architecture for Axum Backends

rustzen-admin: Complete Declarative Permission System Architecture for Axum Backends

Comments
8 min read
Beginner’s Guide to IDS vs IPS in Cyber Security
Cover image for Beginner’s Guide to IDS vs IPS in Cyber Security

Beginner’s Guide to IDS vs IPS in Cyber Security

Comments
3 min read
SafeLine WAF High Availability Solution

SafeLine WAF High Availability Solution

5
Comments 2
4 min read
Future-Proofing APIs: Intelligent Gateways in the Age of AI and Kubernetes

Future-Proofing APIs: Intelligent Gateways in the Age of AI and Kubernetes

1
Comments
7 min read
What Does Remote Management Mean on My Mac? (And Should You Be Worried?)
Cover image for What Does Remote Management Mean on My Mac? (And Should You Be Worried?)

What Does Remote Management Mean on My Mac? (And Should You Be Worried?)

Comments
3 min read
Security Compliance Enforcement (SCE) version 2.4.0 for Linux is now available!
Cover image for Security Compliance Enforcement (SCE) version 2.4.0 for Linux is now available!

Security Compliance Enforcement (SCE) version 2.4.0 for Linux is now available!

Comments
1 min read
loading...