Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Critical Security Flaw: Security Flaw Techniques

Critical Security Flaw: Security Flaw Techniques

1
Comments
1 min read
AI-Generated Code in 2025: The Silent Security Crisis Developers Can’t Ignore

AI-Generated Code in 2025: The Silent Security Crisis Developers Can’t Ignore

2
Comments
3 min read
OWASP Cornucopia Companion Edition
Cover image for OWASP Cornucopia Companion Edition

OWASP Cornucopia Companion Edition

3
Comments
2 min read
How to Deploy SafeLine WAF on a cPanel VPS

How to Deploy SafeLine WAF on a cPanel VPS

5
Comments
2 min read
A Hybrid Login-Linked Registration Method as a Security Measure Against Game Piracy

A Hybrid Login-Linked Registration Method as a Security Measure Against Game Piracy

5
Comments
5 min read
The Complete Guide to HTTP Cookies: What Every Web Developer Must Know
Cover image for The Complete Guide to HTTP Cookies: What Every Web Developer Must Know

The Complete Guide to HTTP Cookies: What Every Web Developer Must Know

2
Comments 2
15 min read
How to Choose the Right Authentication Method for Your Backend
Cover image for How to Choose the Right Authentication Method for Your Backend

How to Choose the Right Authentication Method for Your Backend

4
Comments 1
4 min read
5 Ways Your Translation Processes Pose a Security Risk

5 Ways Your Translation Processes Pose a Security Risk

7
Comments
3 min read
Stuff we shipped in July

Stuff we shipped in July

4
Comments 1
1 min read
Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

5
Comments
4 min read
Embracing CDK: Use Case to Move from CloudFormation YAML to CDK?

Embracing CDK: Use Case to Move from CloudFormation YAML to CDK?

Comments
9 min read
Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)
Cover image for Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)

Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)

3
Comments 1
3 min read
A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'
Cover image for A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

Comments
1 min read
Implementing Robust API Security Measures [Part 2]
Cover image for Implementing Robust API Security Measures [Part 2]

Implementing Robust API Security Measures [Part 2]

Comments
2 min read
Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown
Cover image for Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Comments
1 min read
Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'
Cover image for Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'

Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'

Comments
1 min read
A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'
Cover image for A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

Comments
1 min read
Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall
Cover image for Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

3
Comments
3 min read
Securing MCP Servers
Cover image for Securing MCP Servers

Securing MCP Servers

4
Comments
8 min read
How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security
Cover image for How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

6
Comments
3 min read
How to Create a Read-Only User in PostgreSQL (With Access to Statistics)
Cover image for How to Create a Read-Only User in PostgreSQL (With Access to Statistics)

How to Create a Read-Only User in PostgreSQL (With Access to Statistics)

Comments
2 min read
Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)
Cover image for Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)

Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)

Comments
3 min read
CVE-2022-46166 - Template Injection - Remote Code Execution

CVE-2022-46166 - Template Injection - Remote Code Execution

Comments
3 min read
Access and Refresh Tokens in Token-Based Authentication
Cover image for Access and Refresh Tokens in Token-Based Authentication

Access and Refresh Tokens in Token-Based Authentication

18
Comments 1
6 min read
Understand Bots and Protect Your Website from Bot Attacks
Cover image for Understand Bots and Protect Your Website from Bot Attacks

Understand Bots and Protect Your Website from Bot Attacks

Comments
4 min read
loading...