Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
SonarQube: SCA Scanning of Unmanaged Dependencies in Java Projects with Syft and SBOM Import

SonarQube: SCA Scanning of Unmanaged Dependencies in Java Projects with Syft and SBOM Import

1
Comments
1 min read
Does Your App Reveal Its Server Header? You Might Be Helping Attackers
Cover image for Does Your App Reveal Its Server Header? You Might Be Helping Attackers

Does Your App Reveal Its Server Header? You Might Be Helping Attackers

3
Comments
3 min read
SonarQube: SCA Scanning of Unmanaged Dependencies in C/C++ Projects with Syft and SBOM Import

SonarQube: SCA Scanning of Unmanaged Dependencies in C/C++ Projects with Syft and SBOM Import

Comments 1
1 min read
Dissecting Digital Viruses: My First Steps in Malware Analysis
Cover image for Dissecting Digital Viruses: My First Steps in Malware Analysis

Dissecting Digital Viruses: My First Steps in Malware Analysis

Comments
2 min read
How to Check Your SSL Certificate (And Why It Matters)

How to Check Your SSL Certificate (And Why It Matters)

Comments 2
3 min read
CVE-2026-23518: Fleet Fiasco: The Unverified JWT That Opened the Gates

CVE-2026-23518: Fleet Fiasco: The Unverified JWT That Opened the Gates

Comments
2 min read
Real-time Malicious Package Protection for AI Coding Agents

Real-time Malicious Package Protection for AI Coding Agents

1
Comments
2 min read
🔍 Software Composition Analysis (SCA)
Cover image for 🔍 Software Composition Analysis (SCA)

🔍 Software Composition Analysis (SCA)

Comments
2 min read
A quick guide to Python's Dictionary
Cover image for A quick guide to Python's Dictionary

A quick guide to Python's Dictionary

Comments 1
3 min read
Rate Limiting Access Codes: The Delicate Balance Between Security and UX
Cover image for Rate Limiting Access Codes: The Delicate Balance Between Security and UX

Rate Limiting Access Codes: The Delicate Balance Between Security and UX

1
Comments
2 min read
Understanding RSA: A Simple Guide to Public-Key Math
Cover image for Understanding RSA: A Simple Guide to Public-Key Math

Understanding RSA: A Simple Guide to Public-Key Math

6
Comments 2
3 min read
Setting Up NextJS 13 with Auth0 and Sub-Domains: A Guide to Multi-Tenancy Web Apps

Setting Up NextJS 13 with Auth0 and Sub-Domains: A Guide to Multi-Tenancy Web Apps

Comments
5 min read
When Smart Devices Stop Working Offline
Cover image for When Smart Devices Stop Working Offline

When Smart Devices Stop Working Offline

4
Comments
3 min read
Security Deep Dive: How the ERC-20 permit Function was Exploited for a $92K XAUt Theft

Security Deep Dive: How the ERC-20 permit Function was Exploited for a $92K XAUt Theft

1
Comments
2 min read
Secuditor Lite – Diagnostic Security Tool for Windows

Secuditor Lite – Diagnostic Security Tool for Windows

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.