Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Outil de Cybersécurité du Jour - Sep 24, 2025

Outil de Cybersécurité du Jour - Sep 24, 2025

1
Comments
3 min read
7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

Comments
3 min read
Samba on Linux - File Sharing for Mixed Environments
Cover image for Samba on Linux - File Sharing for Mixed Environments

Samba on Linux - File Sharing for Mixed Environments

5
Comments 1
5 min read
Protecting against cross-site scripting with trusted types
Cover image for Protecting against cross-site scripting with trusted types

Protecting against cross-site scripting with trusted types

Comments
4 min read
Turbocharge Your Code Security: AI Bug Hunting is Here

Turbocharge Your Code Security: AI Bug Hunting is Here

Comments
2 min read
Threat Hunting With ZoomEye 2025
Cover image for Threat Hunting With ZoomEye 2025

Threat Hunting With ZoomEye 2025

Comments
5 min read
7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

Comments
3 min read
Zonas de governança: playground vs. produção

Zonas de governança: playground vs. produção

1
Comments
1 min read
What is the best SSH server management?

What is the best SSH server management?

Comments
1 min read
Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas
Cover image for Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

1
Comments
4 min read
Price Oracle Manipulation:
Cover image for Price Oracle Manipulation:

Price Oracle Manipulation:

2
Comments
2 min read
The Problem With Legacy Access

The Problem With Legacy Access

4
Comments
1 min read
Part 1: Understanding AWS Identity and Access Management (IAM)

Part 1: Understanding AWS Identity and Access Management (IAM)

Comments
4 min read
Can We Really Trust AI? Lies, Poison, and the Need for Responsible AI
Cover image for Can We Really Trust AI? Lies, Poison, and the Need for Responsible AI

Can We Really Trust AI? Lies, Poison, and the Need for Responsible AI

3
Comments
6 min read
How the Dark Web Actually Works: The Tech Behind the Curtain(part2)
Cover image for How the Dark Web Actually Works: The Tech Behind the Curtain(part2)

How the Dark Web Actually Works: The Tech Behind the Curtain(part2)

10
Comments 1
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.