Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Create GitLab Access Token

Create GitLab Access Token

Comments
1 min read
Building a Simple, Secure File Upload System with AWS Lambda and S3

Building a Simple, Secure File Upload System with AWS Lambda and S3

Comments
2 min read
How Shadow IT Turns Employees Into Unintentional Insider Threats
Cover image for How Shadow IT Turns Employees Into Unintentional Insider Threats

How Shadow IT Turns Employees Into Unintentional Insider Threats

Comments
5 min read
Building a Privacy-Preserving Voting App

Building a Privacy-Preserving Voting App

Comments
1 min read
Why Your AI-Generated Code is Probably Garbage (And How to Fix It)
Cover image for Why Your AI-Generated Code is Probably Garbage (And How to Fix It)

Why Your AI-Generated Code is Probably Garbage (And How to Fix It)

Comments
16 min read
A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)
Cover image for A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)

A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)

Comments
3 min read
# Defending the Cloud-Native Frontier: Security as Code with Terraform & OPA

# Defending the Cloud-Native Frontier: Security as Code with Terraform & OPA

Comments
1 min read
We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)
Cover image for We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)

We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)

Comments
2 min read
Building a Fast File Transfer Tool, Part 2: Beating rsync by 58% with kTLS
Cover image for Building a Fast File Transfer Tool, Part 2: Beating rsync by 58% with kTLS

Building a Fast File Transfer Tool, Part 2: Beating rsync by 58% with kTLS

1
Comments
4 min read
Start Here: PainTracker + CrisisCore Build Log (Privacy-First, Offline-First, No Surveillance)

Start Here: PainTracker + CrisisCore Build Log (Privacy-First, Offline-First, No Surveillance)

Comments
1 min read
Cybersecurity ProxyChains: A Mask of Anonymity

Cybersecurity ProxyChains: A Mask of Anonymity

1
Comments
3 min read
AI Chat Privacy Breach Explained How a Trusted Chrome Extension Exposed Millions of Conversations
Cover image for AI Chat Privacy Breach Explained How a Trusted Chrome Extension Exposed Millions of Conversations

AI Chat Privacy Breach Explained How a Trusted Chrome Extension Exposed Millions of Conversations

Comments
5 min read
Designing Bitcoin Infrastructure Under Adversarial Assumptions
Cover image for Designing Bitcoin Infrastructure Under Adversarial Assumptions

Designing Bitcoin Infrastructure Under Adversarial Assumptions

Comments
4 min read
Async Assumptions That Create Security Blind Spots in Web3 Backends.
Cover image for Async Assumptions That Create Security Blind Spots in Web3 Backends.

Async Assumptions That Create Security Blind Spots in Web3 Backends.

5
Comments
4 min read
The Great GCP Identity Crisis: Unraveling Resource Manager Tags vs. Labels

The Great GCP Identity Crisis: Unraveling Resource Manager Tags vs. Labels

2
Comments
8 min read
Veri v2.0: Important Fixes for Rails Authentication Gem

Veri v2.0: Important Fixes for Rails Authentication Gem

1
Comments
1 min read
Praktikum Keamanan Web: Cross-Site Request Forgery (CSRF) 😱🛡️
Cover image for Praktikum Keamanan Web: Cross-Site Request Forgery (CSRF) 😱🛡️

Praktikum Keamanan Web: Cross-Site Request Forgery (CSRF) 😱🛡️

Comments
3 min read
Exploiting Unvalidated Redirects for XSS
Cover image for Exploiting Unvalidated Redirects for XSS

Exploiting Unvalidated Redirects for XSS

2
Comments
8 min read
QARX-256

QARX-256

Comments
1 min read
Stealth Inline Hook Detection via LR Return Address

Stealth Inline Hook Detection via LR Return Address

Comments
2 min read
How to Tell if a YouTube Video is a Scam in 2026: The Complete Guide
Cover image for How to Tell if a YouTube Video is a Scam in 2026: The Complete Guide

How to Tell if a YouTube Video is a Scam in 2026: The Complete Guide

1
Comments
11 min read
Microsoft Cloud Adoption Framework
Cover image for Microsoft Cloud Adoption Framework

Microsoft Cloud Adoption Framework

Comments
1 min read
🌐 CORS Policies Every Backend Developer Must Know
Cover image for 🌐 CORS Policies Every Backend Developer Must Know

🌐 CORS Policies Every Backend Developer Must Know

1
Comments
2 min read
Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager
Cover image for Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Comments
4 min read
ASP.NET CORE - How to using IAuthorizationRequirementData

ASP.NET CORE - How to using IAuthorizationRequirementData

Comments
2 min read
loading...