Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 8 — Threat Validation (The Girl in the Red Cloak)
Cover image for Day 8 — Threat Validation (The Girl in the Red Cloak)

Day 8 — Threat Validation (The Girl in the Red Cloak)

3
Comments
2 min read
(7/8) Firewall: Estrutura, Fluxo e Políticas Reais

(7/8) Firewall: Estrutura, Fluxo e Políticas Reais

Comments
4 min read
React2Shell Hacked My Servers. Here’s Your 3-Step Fix.
Cover image for React2Shell Hacked My Servers. Here’s Your 3-Step Fix.

React2Shell Hacked My Servers. Here’s Your 3-Step Fix.

6
Comments 2
2 min read
Without DNS, The Internet Won't Exist
Cover image for Without DNS, The Internet Won't Exist

Without DNS, The Internet Won't Exist

6
Comments
8 min read
Introducing Supabomb: Open Source Supabase Penetration Testing
Cover image for Introducing Supabomb: Open Source Supabase Penetration Testing

Introducing Supabomb: Open Source Supabase Penetration Testing

1
Comments
8 min read
I Built an Open-Source Privacy Firewall for ChatGPT (Runs 100% Locally)

I Built an Open-Source Privacy Firewall for ChatGPT (Runs 100% Locally)

Comments
4 min read
How Developers Can Quickly Validate Application Security Before Deployment (2025 Guide)
Cover image for How Developers Can Quickly Validate Application Security Before Deployment (2025 Guide)

How Developers Can Quickly Validate Application Security Before Deployment (2025 Guide)

1
Comments
2 min read
Trying LLM-Based Threat Modeling

Trying LLM-Based Threat Modeling

Comments
7 min read
AWS Security Series: AWS Access Key is Compromised. Now What? An Incident Response Playbook.
Cover image for AWS Security Series: AWS Access Key is Compromised. Now What? An Incident Response Playbook.

AWS Security Series: AWS Access Key is Compromised. Now What? An Incident Response Playbook.

Comments
3 min read
Advent of Cyber 2025 Day 11 Writeup: Cross-Site Scripting (XSS) | TryHackMe
Cover image for Advent of Cyber 2025 Day 11 Writeup: Cross-Site Scripting (XSS) | TryHackMe

Advent of Cyber 2025 Day 11 Writeup: Cross-Site Scripting (XSS) | TryHackMe

Comments
2 min read
Secure Secrets in Google Apps Script

Secure Secrets in Google Apps Script

1
Comments
4 min read
Types of Penetration Testing: A Practical Guide for Developers in 2025
Cover image for Types of Penetration Testing: A Practical Guide for Developers in 2025

Types of Penetration Testing: A Practical Guide for Developers in 2025

Comments
4 min read
Securing Real-Time Pipelines: Auth, CORS, and DoS Protection

Securing Real-Time Pipelines: Auth, CORS, and DoS Protection

Comments
6 min read
SeguraPass: A Zero-Knowledge, End-to-End Encrypted Password Manager Built in Java
Cover image for SeguraPass: A Zero-Knowledge, End-to-End Encrypted Password Manager Built in Java

SeguraPass: A Zero-Knowledge, End-to-End Encrypted Password Manager Built in Java

Comments
7 min read
Outil de Cybersécurité du Jour - Dec 8, 2025

Outil de Cybersécurité du Jour - Dec 8, 2025

Comments
3 min read
Outil de Cybersécurité du Jour - Dec 7, 2025

Outil de Cybersécurité du Jour - Dec 7, 2025

Comments
3 min read
CRITICAL: New React Server Component Vulnerabilities - Denial of Service and Source Code Exposure
Cover image for CRITICAL: New React Server Component Vulnerabilities - Denial of Service and Source Code Exposure

CRITICAL: New React Server Component Vulnerabilities - Denial of Service and Source Code Exposure

1
Comments
3 min read
When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story
Cover image for When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story

When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story

Comments
4 min read
More Security With Landlock

More Security With Landlock

Comments
3 min read
🌐 Strengthening the Security Pillar of the AWS Well-Architected Framework: Introducing EC2 Instance Attestation

🌐 Strengthening the Security Pillar of the AWS Well-Architected Framework: Introducing EC2 Instance Attestation

Comments
2 min read
AIDE Automation Framework From Integrity Checks to Self-Verification
Cover image for AIDE Automation Framework From Integrity Checks to Self-Verification

AIDE Automation Framework From Integrity Checks to Self-Verification

1
Comments
4 min read
JWTs Explained: A Beginner’s Guide
Cover image for JWTs Explained: A Beginner’s Guide

JWTs Explained: A Beginner’s Guide

1
Comments
2 min read
VulnFeed 2.0: Building a Zero-Server Vulnerability Dashboard (Level 2 Release)

VulnFeed 2.0: Building a Zero-Server Vulnerability Dashboard (Level 2 Release)

Comments
6 min read
Protecting the API Entry Point with Cloudflare Workers

Protecting the API Entry Point with Cloudflare Workers

Comments
4 min read
Security in AWS: Understanding AWS Security Services and How They Protect Your Cloud, Like a 4th-Grade Kid.
Cover image for Security in AWS: Understanding AWS Security Services and How They Protect Your Cloud, Like a 4th-Grade Kid.

Security in AWS: Understanding AWS Security Services and How They Protect Your Cloud, Like a 4th-Grade Kid.

2
Comments
3 min read
loading...