Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Starting My Web2 & Web3 Security Journey as a novice
Cover image for Starting My Web2 & Web3 Security Journey as a novice

Starting My Web2 & Web3 Security Journey as a novice

Comments 2
1 min read
Regulation vs. Responsibility: Where developers must lead

Regulation vs. Responsibility: Where developers must lead

2
Comments
3 min read
Understanding Content Security Policy (CSP) in JavaScript Apps

Understanding Content Security Policy (CSP) in JavaScript Apps

1
Comments
1 min read
Why Node.js SEA Is (Still) Bad for Source Code Protection

Why Node.js SEA Is (Still) Bad for Source Code Protection

Comments
1 min read
Cybersecurity Challenges in South Africa
Cover image for Cybersecurity Challenges in South Africa

Cybersecurity Challenges in South Africa

8
Comments 2
2 min read
Security—The Barrier to Blockchain Adoption.
Cover image for Security—The Barrier to Blockchain Adoption.

Security—The Barrier to Blockchain Adoption.

Comments
4 min read
🤳📍 Your Phone’s Silent Betrayal: What Your Photos Are Revealing
Cover image for 🤳📍 Your Phone’s Silent Betrayal: What Your Photos Are Revealing

🤳📍 Your Phone’s Silent Betrayal: What Your Photos Are Revealing

2
Comments
4 min read
Building an Azure Misconfiguration Scanner: Week 1 of My 90-Day Challenge

Building an Azure Misconfiguration Scanner: Week 1 of My 90-Day Challenge

Comments
2 min read
[rant] Rust: The Safety Language That Still Isn’t Safe Enough

[rant] Rust: The Safety Language That Still Isn’t Safe Enough

1
Comments
2 min read
Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa
Cover image for Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

1
Comments
1 min read
What Is Steganography? Hidden Messages in Images Explained

What Is Steganography? Hidden Messages in Images Explained

6
Comments
3 min read
How to configure SSH for accessing remote repositories
Cover image for How to configure SSH for accessing remote repositories

How to configure SSH for accessing remote repositories

2
Comments
5 min read
HackTheSite Basic 5

HackTheSite Basic 5

Comments
1 min read
The Two Generals’ Problem: A Fundamental Communication Paradox
Cover image for The Two Generals’ Problem: A Fundamental Communication Paradox

The Two Generals’ Problem: A Fundamental Communication Paradox

6
Comments
2 min read
Networking Series 5: Testing VPC Connectivity
Cover image for Networking Series 5: Testing VPC Connectivity

Networking Series 5: Testing VPC Connectivity

Comments
3 min read
How I Caught an MPESA API Leak Hiding in Plain Sight

How I Caught an MPESA API Leak Hiding in Plain Sight

2
Comments
2 min read
Comment j’ai aidé mes clients à dormir tranquille grâce à la maintenance WordPress

Comment j’ai aidé mes clients à dormir tranquille grâce à la maintenance WordPress

Comments
2 min read
How to Assign Dataverse Security Roles at Scale
Cover image for How to Assign Dataverse Security Roles at Scale

How to Assign Dataverse Security Roles at Scale

Comments
4 min read
Stop abusing .env files 🔒
Cover image for Stop abusing .env files 🔒

Stop abusing .env files 🔒

48
Comments 7
4 min read
Build a Local Server to Sync Your Contacts and Calendars

Build a Local Server to Sync Your Contacts and Calendars

Comments
2 min read
AI is Hallucinating Package Names - And Hackers Are Ready

AI is Hallucinating Package Names - And Hackers Are Ready

Comments
3 min read
Hacker Summer Camp 2025 Edition | Semgrep Newsletter
Cover image for Hacker Summer Camp 2025 Edition | Semgrep Newsletter

Hacker Summer Camp 2025 Edition | Semgrep Newsletter

3
Comments
5 min read
Offline Messaging Reinvented with Bitchat
Cover image for Offline Messaging Reinvented with Bitchat

Offline Messaging Reinvented with Bitchat

6
Comments
6 min read
Encrypt & Decrypt Text Securely in the Browser
Cover image for Encrypt & Decrypt Text Securely in the Browser

Encrypt & Decrypt Text Securely in the Browser

Comments
2 min read
Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Comments
4 min read
loading...