Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Real-Time Pipelines: Auth, CORS, and DoS Protection

Securing Real-Time Pipelines: Auth, CORS, and DoS Protection

Comments
6 min read
SeguraPass: A Zero-Knowledge, End-to-End Encrypted Password Manager Built in Java
Cover image for SeguraPass: A Zero-Knowledge, End-to-End Encrypted Password Manager Built in Java

SeguraPass: A Zero-Knowledge, End-to-End Encrypted Password Manager Built in Java

Comments
7 min read
Outil de Cybersécurité du Jour - Dec 8, 2025

Outil de Cybersécurité du Jour - Dec 8, 2025

Comments
3 min read
Outil de Cybersécurité du Jour - Dec 7, 2025

Outil de Cybersécurité du Jour - Dec 7, 2025

Comments
3 min read
CRITICAL: New React Server Component Vulnerabilities - Denial of Service and Source Code Exposure
Cover image for CRITICAL: New React Server Component Vulnerabilities - Denial of Service and Source Code Exposure

CRITICAL: New React Server Component Vulnerabilities - Denial of Service and Source Code Exposure

1
Comments
3 min read
When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story
Cover image for When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story

When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story

Comments
4 min read
More Security With Landlock

More Security With Landlock

Comments
3 min read
🌐 Strengthening the Security Pillar of the AWS Well-Architected Framework: Introducing EC2 Instance Attestation

🌐 Strengthening the Security Pillar of the AWS Well-Architected Framework: Introducing EC2 Instance Attestation

Comments
2 min read
AIDE Automation Framework From Integrity Checks to Self-Verification
Cover image for AIDE Automation Framework From Integrity Checks to Self-Verification

AIDE Automation Framework From Integrity Checks to Self-Verification

1
Comments
4 min read
JWTs Explained: A Beginner’s Guide
Cover image for JWTs Explained: A Beginner’s Guide

JWTs Explained: A Beginner’s Guide

1
Comments
2 min read
VulnFeed 2.0: Building a Zero-Server Vulnerability Dashboard (Level 2 Release)

VulnFeed 2.0: Building a Zero-Server Vulnerability Dashboard (Level 2 Release)

Comments
6 min read
Protecting the API Entry Point with Cloudflare Workers

Protecting the API Entry Point with Cloudflare Workers

Comments
4 min read
Security in AWS: Understanding AWS Security Services and How They Protect Your Cloud, Like a 4th-Grade Kid.
Cover image for Security in AWS: Understanding AWS Security Services and How They Protect Your Cloud, Like a 4th-Grade Kid.

Security in AWS: Understanding AWS Security Services and How They Protect Your Cloud, Like a 4th-Grade Kid.

2
Comments
3 min read
I built a "Paranoid" Data Protocol that runs away from server seizure or censorship (Python + Rust)
Cover image for I built a "Paranoid" Data Protocol that runs away from server seizure or censorship (Python + Rust)

I built a "Paranoid" Data Protocol that runs away from server seizure or censorship (Python + Rust)

5
Comments
2 min read
Stop Waiting for a Breach. Let This Open-Source AI Agent Hack You First

Stop Waiting for a Breach. Let This Open-Source AI Agent Hack You First

Comments
2 min read
LogGuard
Cover image for LogGuard

LogGuard

2
Comments
4 min read
Urgent Security Update from Next.js
Cover image for Urgent Security Update from Next.js

Urgent Security Update from Next.js

Comments
1 min read
API Security Essentials for Modern Web Developers
Cover image for API Security Essentials for Modern Web Developers

API Security Essentials for Modern Web Developers

1
Comments
4 min read
🎉 Slither Deep Audit Completed – Lattice L2

🎉 Slither Deep Audit Completed – Lattice L2

Comments
2 min read
Upgrade Your React Apps!!!
Cover image for Upgrade Your React Apps!!!

Upgrade Your React Apps!!!

1
Comments 1
2 min read
MemGuard: Rethinking Secure Storage in Flutter with Zero-Leak Architecture
Cover image for MemGuard: Rethinking Secure Storage in Flutter with Zero-Leak Architecture

MemGuard: Rethinking Secure Storage in Flutter with Zero-Leak Architecture

3
Comments
4 min read
The Projector Botnet: How a Simple Home Device Was Exploited for Ads, Data, and Bandwidth
Cover image for The Projector Botnet: How a Simple Home Device Was Exploited for Ads, Data, and Bandwidth

The Projector Botnet: How a Simple Home Device Was Exploited for Ads, Data, and Bandwidth

Comments
4 min read
IA dans DevSecOps

IA dans DevSecOps

Comments
3 min read
AWS SSO Account Credentials Extractor

AWS SSO Account Credentials Extractor

Comments
1 min read
Outil de Cybersécurité du Jour - Dec 6, 2025

Outil de Cybersécurité du Jour - Dec 6, 2025

Comments
3 min read
loading...