Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Linux Privilege Escalation: Advanced Detection and Mitigation

Linux Privilege Escalation: Advanced Detection and Mitigation

1
Comments
2 min read
React Authentication Made Easy with Keycloak
Cover image for React Authentication Made Easy with Keycloak

React Authentication Made Easy with Keycloak

1
Comments
2 min read
Why Security Audits Are Critical in the Web3 Space
Cover image for Why Security Audits Are Critical in the Web3 Space

Why Security Audits Are Critical in the Web3 Space

1
Comments
2 min read
Why Service Account Impersonation is Essential for Secure and Efficient Cloud Development

Why Service Account Impersonation is Essential for Secure and Efficient Cloud Development

2
Comments
8 min read
100 Days of DevOps: Day 7

100 Days of DevOps: Day 7

2
Comments
2 min read
Monitor HTTP Response Headers Like a Pro: Introducing Header Change Notifier for Burp Suite

Monitor HTTP Response Headers Like a Pro: Introducing Header Change Notifier for Burp Suite

Comments
2 min read
Introducing JWTauditor: Your Ultimate Burp Suite Extension for Passive JWT Security Analysis
Cover image for Introducing JWTauditor: Your Ultimate Burp Suite Extension for Passive JWT Security Analysis

Introducing JWTauditor: Your Ultimate Burp Suite Extension for Passive JWT Security Analysis

1
Comments
2 min read
Securing Your Code with AWS Inspector: A Comprehensive Guide to Code Security Scanning

Securing Your Code with AWS Inspector: A Comprehensive Guide to Code Security Scanning

3
Comments
4 min read
Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks
Cover image for Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks

Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks

1
Comments 1
4 min read
Secure Kubernetes External Access with ExternalDNS and cert-manager

Secure Kubernetes External Access with ExternalDNS and cert-manager

Comments
1 min read
Cybersecurity Learning Journey: Reposting with Clarity
Cover image for Cybersecurity Learning Journey: Reposting with Clarity

Cybersecurity Learning Journey: Reposting with Clarity

1
Comments 1
2 min read
Cybr - Introduction to AWS Security

Cybr - Introduction to AWS Security

Comments
1 min read
Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe
Cover image for Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe

Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe

Comments
5 min read
Security news weekly round-up - 8th August 2025
Cover image for Security news weekly round-up - 8th August 2025

Security news weekly round-up - 8th August 2025

1
Comments
4 min read
How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design
Cover image for How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design

How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design

1
Comments
4 min read
Secure Your Network Using Termux Scanning Tools

Secure Your Network Using Termux Scanning Tools

2
Comments
4 min read
Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)
Cover image for Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)

Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)

1
Comments
4 min read
Unmasking the Man in the Middle – The Secrets of Secure Connections
Cover image for Unmasking the Man in the Middle – The Secrets of Secure Connections

Unmasking the Man in the Middle – The Secrets of Secure Connections

Comments
6 min read
SSIS Tip: How to Check the Project or Package Protection Level
Cover image for SSIS Tip: How to Check the Project or Package Protection Level

SSIS Tip: How to Check the Project or Package Protection Level

Comments
1 min read
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

1
Comments
3 min read
Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching
Cover image for Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

Comments
8 min read
Security Briefing: Security Flaw Analysis

Security Briefing: Security Flaw Analysis

2
Comments
3 min read
Threat Advisory: Security Flaw Defense

Threat Advisory: Security Flaw Defense

1
Comments
1 min read
Critical Security Flaw: Security Flaw Techniques

Critical Security Flaw: Security Flaw Techniques

1
Comments
1 min read
Security Analysis: None

Security Analysis: None

1
Comments
3 min read
loading...