Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Beware of Interview Scams!

Beware of Interview Scams!

5
Comments 1
3 min read
Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

6
Comments
2 min read
(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

Comments
1 min read
Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍

Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍

1
Comments
6 min read
Hacked Without Touching Your Phone!

Hacked Without Touching Your Phone!

6
Comments
3 min read
Fail-Safe PII Redaction in Elixir

Fail-Safe PII Redaction in Elixir

3
Comments 1
3 min read
What is a WAF? Why and When Do You Need a WAF?

What is a WAF? Why and When Do You Need a WAF?

8
Comments
2 min read
Adding HTTPS to django app on VM(Windows OS) Production level

Adding HTTPS to django app on VM(Windows OS) Production level

Comments
1 min read
How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device

How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device

Comments
2 min read
EnvShare - A secured, Role-based Access way to share .env file

EnvShare - A secured, Role-based Access way to share .env file

14
Comments 1
2 min read
Lubyc: Your Ultimate AI Business Platform in 2025

Lubyc: Your Ultimate AI Business Platform in 2025

Comments
2 min read
Create AES on C/JAVA || Forward S-box (first part)

Create AES on C/JAVA || Forward S-box (first part)

21
Comments 2
4 min read
Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

1
Comments
3 min read
Useful Sites for Privacy and Security

Useful Sites for Privacy and Security

Comments
3 min read
Creating a Self Signed Certificate and Verifying the Private Key and Certificate

Creating a Self Signed Certificate and Verifying the Private Key and Certificate

Comments
3 min read
Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Comments
2 min read
JWT Tokens: Secure Your APIs Like a Pro

JWT Tokens: Secure Your APIs Like a Pro

2
Comments 3
8 min read
The 7 Dumbest Ways Small Businesses Get Hacked (And How to Avoid Them)

The 7 Dumbest Ways Small Businesses Get Hacked (And How to Avoid Them)

Comments
4 min read
Navigating the Maze: A Guide to Essential Information Security Standards

Navigating the Maze: A Guide to Essential Information Security Standards

Comments
2 min read
How I Use AI Agents Without Compromising Code Quality & Security

How I Use AI Agents Without Compromising Code Quality & Security

2
Comments
2 min read
How To: Update AWS SRA in your Control Tower environment

How To: Update AWS SRA in your Control Tower environment

3
Comments
4 min read
Software Testing - Manual Testing ,Levels,Types

Software Testing - Manual Testing ,Levels,Types

Comments
4 min read
Which LLMs Are (and Aren't) Ready for Secure Code?

Which LLMs Are (and Aren't) Ready for Secure Code?

20
Comments
3 min read
Securing APIs with Two-Factor Authentication

Securing APIs with Two-Factor Authentication

Comments
12 min read
Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Comments
2 min read
loading...