Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building Kafka HTTP Scanner: An Open-Source Web Vulnerability Scanner in Go

Building Kafka HTTP Scanner: An Open-Source Web Vulnerability Scanner in Go

6
Comments 1
4 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

Comments
1 min read
Essential Ingredient in Making TEEs Truly Secure? Remote Attestation.

Essential Ingredient in Making TEEs Truly Secure? Remote Attestation.

1
Comments 5
2 min read
Cross-Account Parameter Sharing in AWS with RAM using Terraform: A Practical Guide

Cross-Account Parameter Sharing in AWS with RAM using Terraform: A Practical Guide

8
Comments 2
7 min read
Login Page for Modern Applications

Login Page for Modern Applications

Comments
6 min read
Network Virtualization: The Future of Scalable IT Infrastructure

Network Virtualization: The Future of Scalable IT Infrastructure

Comments
1 min read
Understanding SHA-256 and Merkle Root in Blockchain

Understanding SHA-256 and Merkle Root in Blockchain

Comments
9 min read
JavaScript Rules, Wiz Integration, Bitbucket SCM and Catching Malicious Dependencies

JavaScript Rules, Wiz Integration, Bitbucket SCM and Catching Malicious Dependencies

3
Comments
5 min read
Implementing AWS Identity and Access Management (IAM) in Migration

Implementing AWS Identity and Access Management (IAM) in Migration

Comments
4 min read
How to Pick ⚖️ Platform Engineering Tools 🔧 in 2025 - Advanced Guide 😎

How to Pick ⚖️ Platform Engineering Tools 🔧 in 2025 - Advanced Guide 😎

7
Comments 2
3 min read
DevOps Made Simple: A Beginner’s Guide to Securing the DevOps CI/CD with TLS Certificates

DevOps Made Simple: A Beginner’s Guide to Securing the DevOps CI/CD with TLS Certificates

7
Comments
2 min read
Is Hacking Possible? Security Vulnerabilities and Defense

Is Hacking Possible? Security Vulnerabilities and Defense

Comments
8 min read
Nmap Cheatsheet for Hackers

Nmap Cheatsheet for Hackers

3
Comments
2 min read
How my Kid’s tablet turned me into a Cybersecurity Analyst

How my Kid’s tablet turned me into a Cybersecurity Analyst

Comments 1
2 min read
Deploy Fider as a Private App on AWS with CloudFront VPC Origin

Deploy Fider as a Private App on AWS with CloudFront VPC Origin

Comments
18 min read
Setting Up ClamAV for AWS - File Scan

Setting Up ClamAV for AWS - File Scan

Comments
2 min read
🔎 AWS GuardDuty vs. Inspector vs. Shield 🛡️: Which One Do You Need?

🔎 AWS GuardDuty vs. Inspector vs. Shield 🛡️: Which One Do You Need?

17
Comments 2
5 min read
1. Strengthening Cybersecurity in a Hybrid IT Environment

1. Strengthening Cybersecurity in a Hybrid IT Environment

Comments
1 min read
Understanding the Next.js Middleware Bypass Vulnerability (CVE-2025-29927): A Deep Dive into CVE with CVSS 9.1

Understanding the Next.js Middleware Bypass Vulnerability (CVE-2025-29927): A Deep Dive into CVE with CVSS 9.1

3
Comments 2
6 min read
Devnexus: Bringing Java Into The Age Of AI

Devnexus: Bringing Java Into The Age Of AI

1
Comments
6 min read
Day 7: BackendChallenges.com – The Frontend Security Checklist Devs Ignore

Day 7: BackendChallenges.com – The Frontend Security Checklist Devs Ignore

Comments
1 min read
DevOps Made Simple: A Beginner’s Guide to Zero Trust Security Model for Cloud & DevOps Teams

DevOps Made Simple: A Beginner’s Guide to Zero Trust Security Model for Cloud & DevOps Teams

7
Comments
3 min read
A step-by-step guide to setting up SSH authentication with YubiKey 5.7 or later version and ED25519-SK keys on Windows 11.

A step-by-step guide to setting up SSH authentication with YubiKey 5.7 or later version and ED25519-SK keys on Windows 11.

Comments
3 min read
RBAC Analytics: Key Metrics to Monitor

RBAC Analytics: Key Metrics to Monitor

Comments
5 min read
6 Must-Have Features of an API Gateway

6 Must-Have Features of an API Gateway

Comments
10 min read
loading...