Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 27th September 2024
Cover image for Security news weekly round-up - 27th September 2024

Security news weekly round-up - 27th September 2024

Comments
4 min read
Understanding JSON Web Tokens (JWT): The Key to Secure Authentication
Cover image for Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

3
Comments
2 min read
Easy way to geo-fence your cloud VPS with nftables

Easy way to geo-fence your cloud VPS with nftables

Comments 1
5 min read
This Month in Minder: September 2024
Cover image for This Month in Minder: September 2024

This Month in Minder: September 2024

3
Comments
1 min read
AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

2
Comments 1
1 min read
Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting
Cover image for Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

1
Comments 1
4 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
3G Cell Service Has a HUGE Security Flaw.
Cover image for 3G Cell Service Has a HUGE Security Flaw.

3G Cell Service Has a HUGE Security Flaw.

21
Comments 9
5 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

14
Comments 1
1 min read
Building a Password Manager in Go: Part 2
Cover image for Building a Password Manager in Go: Part 2

Building a Password Manager in Go: Part 2

10
Comments 1
3 min read
Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More
Cover image for Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

1
Comments
3 min read
How Does WAF Prevent OS Command Injection Attacks

How Does WAF Prevent OS Command Injection Attacks

2
Comments
5 min read
How Does WAF Prevent SQL Injection

How Does WAF Prevent SQL Injection

2
Comments
5 min read
Issue 63 of AWS Cloud Security Weekly
Cover image for Issue 63 of AWS Cloud Security Weekly

Issue 63 of AWS Cloud Security Weekly

4
Comments
3 min read
From legacy to cloud serverless - Part 4

From legacy to cloud serverless - Part 4

Comments
7 min read
Enhance DigitalOcean with AWS-Level SSM and SSO Features
Cover image for Enhance DigitalOcean with AWS-Level SSM and SSO Features

Enhance DigitalOcean with AWS-Level SSM and SSO Features

Comments
4 min read
Network Automization using AI.
Cover image for Network Automization using AI.

Network Automization using AI.

Comments
6 min read
HIPAA Compliance Checklist For Healthcare Startups
Cover image for HIPAA Compliance Checklist For Healthcare Startups

HIPAA Compliance Checklist For Healthcare Startups

Comments
7 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
Secure Coding - Prevention Over Correction.
Cover image for Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
How to publish custom cdk-nag rules and rule packs with Projen
Cover image for How to publish custom cdk-nag rules and rule packs with Projen

How to publish custom cdk-nag rules and rule packs with Projen

7
Comments
6 min read
Malware: Detection, Collection, and Analysis
Cover image for Malware: Detection, Collection, and Analysis

Malware: Detection, Collection, and Analysis

2
Comments 2
3 min read
Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago
Cover image for Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

1
Comments
6 min read
Security and Data Protection in Crypto Exchange Mining Pools
Cover image for Security and Data Protection in Crypto Exchange Mining Pools

Security and Data Protection in Crypto Exchange Mining Pools

Comments
2 min read
loading...