Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything
Cover image for May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

Comments
4 min read
API Security Best Practices to Protect Digital Ecosystems
Cover image for API Security Best Practices to Protect Digital Ecosystems

API Security Best Practices to Protect Digital Ecosystems

2
Comments
8 min read
How to secure your server. Easy follow-up steps
Cover image for How to secure your server. Easy follow-up steps

How to secure your server. Easy follow-up steps

1
Comments
5 min read
Generative AI: The Double-Edged Sword in Cloud-Native Security

Generative AI: The Double-Edged Sword in Cloud-Native Security

1
Comments
9 min read
Always Winning at Juwenalia: Hacking Rewards from the Festival App's Mini-Games
Cover image for Always Winning at Juwenalia: Hacking Rewards from the Festival App's Mini-Games

Always Winning at Juwenalia: Hacking Rewards from the Festival App's Mini-Games

Comments
6 min read
UFW(Uncomplicated Firewall)
Cover image for UFW(Uncomplicated Firewall)

UFW(Uncomplicated Firewall)

1
Comments
2 min read
Transforming Industry: The 5G & AI Convergence in IIoT

Transforming Industry: The 5G & AI Convergence in IIoT

2
Comments
6 min read
💻🔒 The Ultimate Guide to Patenting Software & Code (2025 Edition)
Cover image for 💻🔒 The Ultimate Guide to Patenting Software & Code (2025 Edition)

💻🔒 The Ultimate Guide to Patenting Software & Code (2025 Edition)

Comments
5 min read
Most Advanced AI Agents Now Capable of Lying, Scheming & Threatening Their Creators: A Growing AI Safety Concern
Cover image for Most Advanced AI Agents Now Capable of Lying, Scheming & Threatening Their Creators: A Growing AI Safety Concern

Most Advanced AI Agents Now Capable of Lying, Scheming & Threatening Their Creators: A Growing AI Safety Concern

Comments
3 min read
Vulnerability Assessment
Cover image for Vulnerability Assessment

Vulnerability Assessment

Comments
1 min read
Secure SSH by Using a Restricted User: Smarter Linux Hardening
Cover image for Secure SSH by Using a Restricted User: Smarter Linux Hardening

Secure SSH by Using a Restricted User: Smarter Linux Hardening

Comments
1 min read
How to Add Passkey Authentication to Your App with AuthAction Passkey Plus
Cover image for How to Add Passkey Authentication to Your App with AuthAction Passkey Plus

How to Add Passkey Authentication to Your App with AuthAction Passkey Plus

Comments
2 min read
Visual Studio shared user secrets
Cover image for Visual Studio shared user secrets

Visual Studio shared user secrets

5
Comments 6
3 min read
RAMS Emergencia: la app panameña que automatiza el auxilio, protege a los rescatistas y responde incluso sin internet.

RAMS Emergencia: la app panameña que automatiza el auxilio, protege a los rescatistas y responde incluso sin internet.

Comments
5 min read
🛡️ Stop Face Spoofing! EasyShield AI: 92% Accuracy optimized for Edge Devices
Cover image for 🛡️ Stop Face Spoofing! EasyShield AI: 92% Accuracy optimized for Edge Devices

🛡️ Stop Face Spoofing! EasyShield AI: 92% Accuracy optimized for Edge Devices

Comments
1 min read
HackTheSite Basic 6

HackTheSite Basic 6

Comments
1 min read
5 Security Checks Every Developer Should Do Before Shipping
Cover image for 5 Security Checks Every Developer Should Do Before Shipping

5 Security Checks Every Developer Should Do Before Shipping

Comments
3 min read
Security news weekly round-up - 27th June 2025
Cover image for Security news weekly round-up - 27th June 2025

Security news weekly round-up - 27th June 2025

1
Comments
3 min read
I Passed CompTIA Security+ (SY0-701)! Here’s How It Went
Cover image for I Passed CompTIA Security+ (SY0-701)! Here’s How It Went

I Passed CompTIA Security+ (SY0-701)! Here’s How It Went

Comments
3 min read
Claude Learns to Blackmail? : Anthropic's Research
Cover image for Claude Learns to Blackmail? : Anthropic's Research

Claude Learns to Blackmail? : Anthropic's Research

5
Comments
2 min read
🔐 Frontend Security Best Practices Every Developer Should Know
Cover image for 🔐 Frontend Security Best Practices Every Developer Should Know

🔐 Frontend Security Best Practices Every Developer Should Know

Comments
4 min read
AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.
Cover image for AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

1
Comments
2 min read
Unlocking Peak Performance & Fortifying Security: A Developer's Guide to HP Servers

Unlocking Peak Performance & Fortifying Security: A Developer's Guide to HP Servers

1
Comments 1
3 min read
Introduction to Cryptography: Perfect secrecy
Cover image for Introduction to Cryptography: Perfect secrecy

Introduction to Cryptography: Perfect secrecy

Comments
10 min read
Mobile App Fraud Prevention in 2025: Hard Numbers, Real Lessons
Cover image for Mobile App Fraud Prevention in 2025: Hard Numbers, Real Lessons

Mobile App Fraud Prevention in 2025: Hard Numbers, Real Lessons

1
Comments 1
2 min read
loading...