Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Networking Series 9: VPC Endpoints
Cover image for Networking Series 9: VPC Endpoints

Networking Series 9: VPC Endpoints

Comments
5 min read
Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Comments
3 min read
The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe
Cover image for The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

11
Comments 2
5 min read
How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)
Cover image for How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

27
Comments
4 min read
Eyes Wide Shut
Cover image for Eyes Wide Shut

Eyes Wide Shut

Comments
16 min read
Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others
Cover image for Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Comments
5 min read
Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide
Cover image for Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide

Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide

5
Comments
4 min read
How React/Next.js Developers Can Defend Against Inline Style Exfiltration (ISE)
Cover image for How React/Next.js Developers Can Defend Against Inline Style Exfiltration (ISE)

How React/Next.js Developers Can Defend Against Inline Style Exfiltration (ISE)

6
Comments 1
4 min read
Managing Secrets in Dev Tools Without Getting Yelled At
Cover image for Managing Secrets in Dev Tools Without Getting Yelled At

Managing Secrets in Dev Tools Without Getting Yelled At

2
Comments
7 min read
David Gilbertson Warned us About The Latest NPM Attack

David Gilbertson Warned us About The Latest NPM Attack

Comments
1 min read
Protecting Yourself from Spear Phishing Attacks Such as the One Targeting NPM Maintainers with 2FA Update
Cover image for Protecting Yourself from Spear Phishing Attacks Such as the One Targeting NPM Maintainers with 2FA Update

Protecting Yourself from Spear Phishing Attacks Such as the One Targeting NPM Maintainers with 2FA Update

1
Comments
3 min read
Petoron Quantum Standard (PQS)
Cover image for Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
Petoron Local Destroyer (PLD)
Cover image for Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
What Really Defines a Botnet?

What Really Defines a Botnet?

2
Comments
2 min read
Essential Cybersecurity Practices for Small Businesses Without a Tech Team

Essential Cybersecurity Practices for Small Businesses Without a Tech Team

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.