Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Comments
6 min read
GDPR Compliant Logging in NestJS: Masking User Data in Real Time
Cover image for GDPR Compliant Logging in NestJS: Masking User Data in Real Time

GDPR Compliant Logging in NestJS: Masking User Data in Real Time

1
Comments
5 min read
Advanced LLM Security Best Practices You Must Know
Cover image for Advanced LLM Security Best Practices You Must Know

Advanced LLM Security Best Practices You Must Know

44
Comments 1
6 min read
AI-Assisted Coding: The Hype vs. The Hidden Risks

AI-Assisted Coding: The Hype vs. The Hidden Risks

2
Comments
3 min read
What Happens When Apps Collect Too Much User Data?

What Happens When Apps Collect Too Much User Data?

1
Comments
11 min read
Data Validation and Sanitization in WordPress
Cover image for Data Validation and Sanitization in WordPress

Data Validation and Sanitization in WordPress

Comments
5 min read
Implementing Secure Single Sign-On Between Vue & NodeJs Applications

Implementing Secure Single Sign-On Between Vue & NodeJs Applications

Comments
9 min read
Telegram Boosts User Experience with Improved Technology
Cover image for Telegram Boosts User Experience with Improved Technology

Telegram Boosts User Experience with Improved Technology

Comments
1 min read
Automating My Web App Deployment with AWS CI/CD
Cover image for Automating My Web App Deployment with AWS CI/CD

Automating My Web App Deployment with AWS CI/CD

8
Comments
6 min read
What is Internet Security?

What is Internet Security?

Comments
3 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
How note.com 🔖 Implements ⏳ Just-in-Time (JIT) Database Access Control 🗝️ with Bytebase
Cover image for How note.com 🔖 Implements ⏳ Just-in-Time (JIT) Database Access Control 🗝️ with Bytebase

How note.com 🔖 Implements ⏳ Just-in-Time (JIT) Database Access Control 🗝️ with Bytebase

6
Comments
4 min read
Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Comments
3 min read
WhoWeB Scanner - Simple Website Scanner Tool
Cover image for WhoWeB Scanner - Simple Website Scanner Tool

WhoWeB Scanner - Simple Website Scanner Tool

Comments
1 min read
LAKASA-WIFI - Wi-Fi Connection Script
Cover image for LAKASA-WIFI - Wi-Fi Connection Script

LAKASA-WIFI - Wi-Fi Connection Script

Comments
1 min read
Addressing The Growing Challenge of Generic Secrets: Beyond GitHub's Push Protection
Cover image for Addressing The Growing Challenge of Generic Secrets: Beyond GitHub's Push Protection

Addressing The Growing Challenge of Generic Secrets: Beyond GitHub's Push Protection

1
Comments
8 min read
12 Practices and Tools to Ensure API Security
Cover image for 12 Practices and Tools to Ensure API Security

12 Practices and Tools to Ensure API Security

Comments
13 min read
Understanding Sessions and Tokens: A Deep Dive

Understanding Sessions and Tokens: A Deep Dive

Comments
3 min read
How to Know if a Platform is Fake/Scam: Protect Yourself from Online Fraud

How to Know if a Platform is Fake/Scam: Protect Yourself from Online Fraud

3
Comments 2
4 min read
CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

Comments
2 min read
How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy
Cover image for How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

Comments
2 min read
Guide for the CompTIA Security+ SY0-701 exam
Cover image for Guide for the CompTIA Security+ SY0-701 exam

Guide for the CompTIA Security+ SY0-701 exam

Comments 1
3 min read
💀 Insomni'hack 2025 CTF write-up
Cover image for 💀 Insomni'hack 2025 CTF write-up

💀 Insomni'hack 2025 CTF write-up

4
Comments 1
8 min read
RootMe CTF
Cover image for RootMe CTF

RootMe CTF

1
Comments
3 min read
How to verify GitHub commits with SSH

How to verify GitHub commits with SSH

1
Comments
2 min read
loading...