Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding eBPF: A Game-Changer for Linux Kernel Extensions
Cover image for Understanding eBPF: A Game-Changer for Linux Kernel Extensions

Understanding eBPF: A Game-Changer for Linux Kernel Extensions

Comments
2 min read
How RBAC and ABAC Enhance Security and Compliance

How RBAC and ABAC Enhance Security and Compliance

Comments
5 min read
LTL and CTL Applications for Smart Contracts Security

LTL and CTL Applications for Smart Contracts Security

Comments
3 min read
Hack the Planet as a Service
Cover image for Hack the Planet as a Service

Hack the Planet as a Service

Comments
3 min read
AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2
Cover image for AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

Comments
4 min read
Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3
Cover image for Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Comments
17 min read
Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

4
Comments
7 min read
Hash Passwords in Backend: A Guide for Every Tech Stack
Cover image for Hash Passwords in Backend: A Guide for Every Tech Stack

Hash Passwords in Backend: A Guide for Every Tech Stack

1
Comments
3 min read
DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

Comments
6 min read
Beware of the New Enemy Problem ⚠️

Beware of the New Enemy Problem ⚠️

1
Comments
4 min read
Building a Secure User Activation System in Django
Cover image for Building a Secure User Activation System in Django

Building a Secure User Activation System in Django

3
Comments 1
4 min read
S3cmd: CLI for Object Storage

S3cmd: CLI for Object Storage

6
Comments
3 min read
Bow to the rectangle
Cover image for Bow to the rectangle

Bow to the rectangle

Comments
3 min read
Computer Viruses in Practice: Self-Replication
Cover image for Computer Viruses in Practice: Self-Replication

Computer Viruses in Practice: Self-Replication

Comments
6 min read
System Security Concepts
Cover image for System Security Concepts

System Security Concepts

1
Comments 2
4 min read
A Guide to Role-Based Access Control (RBAC) in Strapi
Cover image for A Guide to Role-Based Access Control (RBAC) in Strapi

A Guide to Role-Based Access Control (RBAC) in Strapi

3
Comments
14 min read
Content Security Policy: Your Website's Unsung Hero

Content Security Policy: Your Website's Unsung Hero

7
Comments
2 min read
Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes
Cover image for Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Comments
3 min read
API Webhook Security

API Webhook Security

Comments
2 min read
Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

7
Comments
6 min read
I built this free tool so IT teams can customize and streamline their employee offboarding
Cover image for I built this free tool so IT teams can customize and streamline their employee offboarding

I built this free tool so IT teams can customize and streamline their employee offboarding

Comments
1 min read
How to Transition from IT Support to Cybersecurity: A Complete Career Guide
Cover image for How to Transition from IT Support to Cybersecurity: A Complete Career Guide

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

26
Comments 6
5 min read
Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI
Cover image for Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Comments
4 min read
Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide
Cover image for Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

1
Comments
3 min read
Security news weekly round-up - 28th February 2025
Cover image for Security news weekly round-up - 28th February 2025

Security news weekly round-up - 28th February 2025

Comments
2 min read
loading...