Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Social Media Widgets and Privacy
Cover image for Social Media Widgets and Privacy

Social Media Widgets and Privacy

12
Comments 3
5 min read
The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

4
Comments 2
7 min read
CyberVault: A Fully Local, Open-Source Password Manager Built with C#
Cover image for CyberVault: A Fully Local, Open-Source Password Manager Built with C#

CyberVault: A Fully Local, Open-Source Password Manager Built with C#

Comments
1 min read
Lift and Slide Doors — Innovative Solutions for Comfort and Security

Lift and Slide Doors — Innovative Solutions for Comfort and Security

3
Comments
2 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js

Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js

1
Comments
3 min read
Understanding Baiting in Cybersecurity: How It Works and How to Protect Yourself

Understanding Baiting in Cybersecurity: How It Works and How to Protect Yourself

Comments
8 min read
9 Free Web App Vulnerability Scanners You Should Know in 2025
Cover image for 9 Free Web App Vulnerability Scanners You Should Know in 2025

9 Free Web App Vulnerability Scanners You Should Know in 2025

1
Comments
4 min read
TiEcon 2025: Cultivating Cultural Capital in the Age of AI
Cover image for TiEcon 2025: Cultivating Cultural Capital in the Age of AI

TiEcon 2025: Cultivating Cultural Capital in the Age of AI

Comments
4 min read
Hardening Docker Images for PCI-DSS Compliance: Practical Strategies for Secure Builds
Cover image for Hardening Docker Images for PCI-DSS Compliance: Practical Strategies for Secure Builds

Hardening Docker Images for PCI-DSS Compliance: Practical Strategies for Secure Builds

3
Comments
3 min read
Understanding PCI-DSS in Docker: Laying the Foundation for Secure Containerized Payment Systems
Cover image for Understanding PCI-DSS in Docker: Laying the Foundation for Secure Containerized Payment Systems

Understanding PCI-DSS in Docker: Laying the Foundation for Secure Containerized Payment Systems

1
Comments
3 min read
Dev Challenge

Dev Challenge

Comments
1 min read
Understanding Worms in Cybersecurity

Understanding Worms in Cybersecurity

1
Comments
9 min read
Understanding Rootkits: Definition, Detection, Removal, and Prevention

Understanding Rootkits: Definition, Detection, Removal, and Prevention

Comments
6 min read
Scaling Your AWS Network with Transit Gateway, VPC Peering, and Hybrid Connectivity
Cover image for Scaling Your AWS Network with Transit Gateway, VPC Peering, and Hybrid Connectivity

Scaling Your AWS Network with Transit Gateway, VPC Peering, and Hybrid Connectivity

Comments
3 min read
Replit GenAI Security Scans and Shadow AI
Cover image for Replit GenAI Security Scans and Shadow AI

Replit GenAI Security Scans and Shadow AI

1
Comments
5 min read
Challenge: File Download
Cover image for Challenge: File Download

Challenge: File Download

Comments 1
1 min read
SQL Injection: A Deep Dive into a Persistent Vulnerability

SQL Injection: A Deep Dive into a Persistent Vulnerability

Comments
4 min read
Which SSL Certificate is Best for Recruiting Websites?
Cover image for Which SSL Certificate is Best for Recruiting Websites?

Which SSL Certificate is Best for Recruiting Websites?

Comments
7 min read
Understanding Application Security: Best Practices, Common Threats, and Essential Tools

Understanding Application Security: Best Practices, Common Threats, and Essential Tools

Comments
7 min read
Building Real Multi-Account Browsers in 2025: The Future of Fingerprint Evasion

Building Real Multi-Account Browsers in 2025: The Future of Fingerprint Evasion

Comments
3 min read
Exploring customLogger: Smart, Customizable Logging in Payload CMS
Cover image for Exploring customLogger: Smart, Customizable Logging in Payload CMS

Exploring customLogger: Smart, Customizable Logging in Payload CMS

3
Comments
10 min read
Unlock the Power of Innovation: A Deep Dive into the Red Hat Developer Program
Cover image for Unlock the Power of Innovation: A Deep Dive into the Red Hat Developer Program

Unlock the Power of Innovation: A Deep Dive into the Red Hat Developer Program

5
Comments
5 min read
Operational Security "OPSEC": Steps, Mistakes, and Tips for Better Security

Operational Security "OPSEC": Steps, Mistakes, and Tips for Better Security

Comments
3 min read
Microsoft Defender for Business Explained: Antivirus, EDR, and Ransomware Protection for SMEs

Microsoft Defender for Business Explained: Antivirus, EDR, and Ransomware Protection for SMEs

Comments
3 min read
Understanding Information Security: Protecting Your Data in the Digital Age

Understanding Information Security: Protecting Your Data in the Digital Age

Comments
8 min read
loading...