Forem

Security

Hopefully not just an afterthought!

Posts

πŸ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒
Cover image for π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Comments
2 min read
Security news weekly round-up - 6th December 2024
Cover image for Security news weekly round-up - 6th December 2024

Security news weekly round-up - 6th December 2024

Comments 1
5 min read
Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis
Cover image for Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

Comments
2 min read
API Keys y Variables de Entorno en Astro: GuΓ­a Completa de Seguridad
Cover image for API Keys y Variables de Entorno en Astro: GuΓ­a Completa de Seguridad

API Keys y Variables de Entorno en Astro: GuΓ­a Completa de Seguridad

Comments
3 min read
Using Docker for Penetration Testing: A Practical Guide
Cover image for Using Docker for Penetration Testing: A Practical Guide

Using Docker for Penetration Testing: A Practical Guide

9
Comments
3 min read
Trusted publishing ‐ It has never been easier to publish your python packages
Cover image for Trusted publishing ‐ It has never been easier to publish your python packages

Trusted publishing ‐ It has never been easier to publish your python packages

7
Comments
5 min read
What Does a Cyber Security Analyst Do?

What Does a Cyber Security Analyst Do?

Comments
2 min read
AntiCrack-DotNet: Advanced Methods to prevent cracking.

AntiCrack-DotNet: Advanced Methods to prevent cracking.

2
Comments
2 min read
Top 5 Compiler Flags to Prevent Stack-Based Attacks
Cover image for Top 5 Compiler Flags to Prevent Stack-Based Attacks

Top 5 Compiler Flags to Prevent Stack-Based Attacks

1
Comments 1
4 min read
Azure Locks: A Comprehensive Guide

Azure Locks: A Comprehensive Guide

1
Comments
2 min read
Remote Code Execution (RCE) in Laravel: Prevention & Example
Cover image for Remote Code Execution (RCE) in Laravel: Prevention & Example

Remote Code Execution (RCE) in Laravel: Prevention & Example

3
Comments
3 min read
How to install and configure Fail2ban for protecting SSH and Nginx
Cover image for How to install and configure Fail2ban for protecting SSH and Nginx

How to install and configure Fail2ban for protecting SSH and Nginx

Comments
2 min read
OS Security and Passwords πŸ”: Protect Your Digital Universe! πŸ›‘οΈ

OS Security and Passwords πŸ”: Protect Your Digital Universe! πŸ›‘οΈ

1
Comments
1 min read
Strengthening Email Security: A Comprehensive Guide to SPF, DKIM, and DMARC Implementation
Cover image for Strengthening Email Security: A Comprehensive Guide to SPF, DKIM, and DMARC Implementation

Strengthening Email Security: A Comprehensive Guide to SPF, DKIM, and DMARC Implementation

6
Comments
2 min read
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.
Cover image for Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

10
Comments
4 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned
Cover image for Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies
Cover image for Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

10
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques
Cover image for Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

11
Comments
5 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities
Cover image for Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

10
Comments
4 min read
Disable password expiration in Windows
Cover image for Disable password expiration in Windows

Disable password expiration in Windows

Comments
1 min read
Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It
Cover image for Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

11
Comments
4 min read
Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution
Cover image for Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution

Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution

1
Comments
4 min read
End Of Series: Mastering Cross-Site Scripting (XSS)
Cover image for End Of Series: Mastering Cross-Site Scripting (XSS)

End Of Series: Mastering Cross-Site Scripting (XSS)

10
Comments
1 min read
Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

4
Comments 1
3 min read
Strengthening Your Cloud Security with AWS Security & Identity Tools
Cover image for Strengthening Your Cloud Security with AWS Security & Identity Tools

Strengthening Your Cloud Security with AWS Security & Identity Tools

Comments
3 min read
loading...