Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Security Disclosure of Vulnerabilities: CVE-2025-3930, CVE-2025-53092, CVE-2025-25298, CVE-2024-56143, and CVE-2024-52588
Cover image for Security Disclosure of Vulnerabilities: CVE-2025-3930, CVE-2025-53092, CVE-2025-25298, CVE-2024-56143, and CVE-2024-52588

Security Disclosure of Vulnerabilities: CVE-2025-3930, CVE-2025-53092, CVE-2025-25298, CVE-2024-56143, and CVE-2024-52588

3
Comments
7 min read
How Google Mistook My Sui Node for a Bitcoin Farm (And Banned Me) (again)
Cover image for How Google Mistook My Sui Node for a Bitcoin Farm (And Banned Me) (again)

How Google Mistook My Sui Node for a Bitcoin Farm (And Banned Me) (again)

Comments
3 min read
Can Stronger Cyber Defense Boost America’s GDP?

Can Stronger Cyber Defense Boost America’s GDP?

Comments
5 min read
Digital Vaults: Unlocking the Future of Data Archiving with Cutting-Edge Databases

Digital Vaults: Unlocking the Future of Data Archiving with Cutting-Edge Databases

Comments
2 min read
Part 3 of My First .NET Core Web API Project: Documenting the Rookie Mistakes and Wins on the Way to a Job.

Part 3 of My First .NET Core Web API Project: Documenting the Rookie Mistakes and Wins on the Way to a Job.

Comments
3 min read
Why is authN and AuthZ still the hardest part of building solo?

Why is authN and AuthZ still the hardest part of building solo?

Comments
1 min read
Next.js Middleware: The Zero-Latency Security Gateway for Enterprise Apps
Cover image for Next.js Middleware: The Zero-Latency Security Gateway for Enterprise Apps

Next.js Middleware: The Zero-Latency Security Gateway for Enterprise Apps

3
Comments
2 min read
Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage
Cover image for Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

1
Comments
2 min read
Hello Dev Community
Cover image for Hello Dev Community

Hello Dev Community

Comments
1 min read
🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

Comments
3 min read
🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

Comments
3 min read
Secure your VPC with AWS Network Firewall

Secure your VPC with AWS Network Firewall

1
Comments
3 min read
EnvSecOps: The Obviously Painful Path Forward

EnvSecOps: The Obviously Painful Path Forward

Comments
3 min read
Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction
Cover image for Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

4
Comments
6 min read
Building Ghostable & Finding Ideas by Listening Well
Cover image for Building Ghostable & Finding Ideas by Listening Well

Building Ghostable & Finding Ideas by Listening Well

4
Comments 2
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.