Forem

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to truncate CBC ciphertext

How to truncate CBC ciphertext

Comments
8 min read
How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

2
Comments
6 min read
Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier

Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier

5
Comments
2 min read
Cyber skill chain

Cyber skill chain

1
Comments
5 min read
How to protect your .NET Web API against Common Security Threats

How to protect your .NET Web API against Common Security Threats

6
Comments
13 min read
Authentication Flow and symmetric keys

Authentication Flow and symmetric keys

4
Comments
2 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

2
Comments
1 min read
Quality software = Secure software

Quality software = Secure software

Comments
3 min read
Getting Started With Cerbos

Getting Started With Cerbos

Comments
7 min read
SQL Injection - In Just 5 Minutes!

SQL Injection - In Just 5 Minutes!

Comments
3 min read
Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! ๐Ÿ”’๐Ÿ’ป

Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! ๐Ÿ”’๐Ÿ’ป

Comments
1 min read
Email Verification with Sent Codes in Ruby on Rails without Devise

Email Verification with Sent Codes in Ruby on Rails without Devise

15
Comments 2
5 min read
How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

Comments
7 min read
Daily Quantum Learning #8 - Quantum Annealing

Daily Quantum Learning #8 - Quantum Annealing

1
Comments
2 min read
The Speakeasy Door to Your Network - Port Knocking (1)

The Speakeasy Door to Your Network - Port Knocking (1)

Comments
3 min read
The Speakeasy Door to Your Network - Port Knocking (2)

The Speakeasy Door to Your Network - Port Knocking (2)

Comments
4 min read
SSO Gone Wrong: Insights from a Real Breach

SSO Gone Wrong: Insights from a Real Breach

2
Comments
4 min read
Security Threat Detection in DevSecOps

Security Threat Detection in DevSecOps

2
Comments
2 min read
Fix Insufficient Logging & Monitoring in Laravel Easily

Fix Insufficient Logging & Monitoring in Laravel Easily

2
Comments
3 min read
Event Recap: OWASP Atlanta Meetup โ€“ The State of Secure Code + Tournament

Event Recap: OWASP Atlanta Meetup โ€“ The State of Secure Code + Tournament

Comments
2 min read
Why Cloud Security Needs a New Playbook: Introducing CNAMM

Why Cloud Security Needs a New Playbook: Introducing CNAMM

Comments
4 min read
Professional TypeScript: Improve Type Safety with Branded Types

Professional TypeScript: Improve Type Safety with Branded Types

Comments
5 min read
Conhecendo OSINT

Conhecendo OSINT

Comments
3 min read
๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

Comments
1 min read
Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Comments
3 min read
loading...