Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments
3 min read
Go & AES-GCM: A Security Deep Dive

Go & AES-GCM: A Security Deep Dive

Comments
4 min read
What is Rate Limiting and How to Add It in Django

What is Rate Limiting and How to Add It in Django

1
Comments
2 min read
(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

11
Comments 4
11 min read
What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

6
Comments
3 min read
AICHA: AI-Powered Healthcare Assistant with Permit.io Authorization

AICHA: AI-Powered Healthcare Assistant with Permit.io Authorization

1
Comments
10 min read
Understanding MCP and Its Security Implications

Understanding MCP and Its Security Implications

Comments
4 min read
Building a Secret Scanner in Julia: A GitLeaks Alternative

Building a Secret Scanner in Julia: A GitLeaks Alternative

Comments
4 min read
Securing AI Document Systems: Implementing the Four-Perimeter Framework with Permit.io

Securing AI Document Systems: Implementing the Four-Perimeter Framework with Permit.io

6
Comments 3
6 min read
leftpad, vibe-coding e o mercado que corta custos a qualquer custo

leftpad, vibe-coding e o mercado que corta custos a qualquer custo

1
Comments
3 min read
What is a CDN? The Secret Sauce Behind Fast Internet (Explained in 5 Minutes)

What is a CDN? The Secret Sauce Behind Fast Internet (Explained in 5 Minutes)

2
Comments
5 min read
Security Showdown: GitHub Actions vs. GitLab CI vs. Jenkins – Who Keeps Your Secrets Safe?

Security Showdown: GitHub Actions vs. GitLab CI vs. Jenkins – Who Keeps Your Secrets Safe?

Comments
3 min read
Secure Admin Setup Without a Database (for Now!)

Secure Admin Setup Without a Database (for Now!)

Comments
3 min read
curl, it's got u

curl, it's got u

1
Comments
2 min read
MCP Security: Tr-tr-tr-tricky, tricky, tricky

MCP Security: Tr-tr-tr-tricky, tricky, tricky

12
Comments 1
4 min read
Your Plaintext Email is a DevSecOps Blind Spot

Your Plaintext Email is a DevSecOps Blind Spot

Comments
5 min read
Cursor AI Security - Deep Dive into Risk, Policy, and Practice

Cursor AI Security - Deep Dive into Risk, Policy, and Practice

1
Comments 2
4 min read
Drosera HandBook: The ABC of Traps

Drosera HandBook: The ABC of Traps

5
Comments
13 min read
(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
Top 5 Intel vPro Features Driving Innovation

Top 5 Intel vPro Features Driving Innovation

Comments
5 min read
Fuzz Testing & Invariants in Solidity: Secure Smart Contracts with Foundry

Fuzz Testing & Invariants in Solidity: Secure Smart Contracts with Foundry

1
Comments 2
10 min read
JWT vs OAuth2 vs Session Cookies: A Complete Authentication Strategy Breakdown for Full Stack Developers

JWT vs OAuth2 vs Session Cookies: A Complete Authentication Strategy Breakdown for Full Stack Developers

2
Comments 2
5 min read
Rethinking Data Security: Built-in Protection from the Frontend

Rethinking Data Security: Built-in Protection from the Frontend

1
Comments 2
5 min read
Como bloqueei um bot abusivo (Scrapy) via User-Agent no NGINX

Como bloqueei um bot abusivo (Scrapy) via User-Agent no NGINX

3
Comments 2
2 min read
loading...