Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Time Machine saved my life*
Cover image for How Time Machine saved my life*

How Time Machine saved my life*

Comments
2 min read
Why SimpleIPAM Doesn't Scan Your Network

Why SimpleIPAM Doesn't Scan Your Network

Comments
3 min read
NPM = Far West : Il est temps d'arrêter cette folie

NPM = Far West : Il est temps d'arrêter cette folie

1
Comments
4 min read
The Hidden Payment Token Revolution
Cover image for The Hidden Payment Token Revolution

The Hidden Payment Token Revolution

Comments
3 min read
South Africa vs Nigeria vs Kenya: The Battle to Become Africa's Crypto Capital
Cover image for South Africa vs Nigeria vs Kenya: The Battle to Become Africa's Crypto Capital

South Africa vs Nigeria vs Kenya: The Battle to Become Africa's Crypto Capital

8
Comments 2
13 min read
Introduction to AWS IAM

Introduction to AWS IAM

Comments
1 min read
Eazypasswords a zero knowledge password manager
Cover image for Eazypasswords a zero knowledge password manager

Eazypasswords a zero knowledge password manager

Comments
2 min read
Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo
Cover image for Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo

Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo

2
Comments 2
1 min read
Quantum Nets: Unmasking Financial Fraud with Unprecedented Accuracy by Arvind Sundararajan

Quantum Nets: Unmasking Financial Fraud with Unprecedented Accuracy by Arvind Sundararajan

Comments
2 min read
COPY FROM Exploits: When PostgreSQL Reads Your Filesystem
Cover image for COPY FROM Exploits: When PostgreSQL Reads Your Filesystem

COPY FROM Exploits: When PostgreSQL Reads Your Filesystem

Comments
4 min read
Pixel-Powered Encryption: Turning an Image into a Key with Python

Pixel-Powered Encryption: Turning an Image into a Key with Python

1
Comments
2 min read
search_path Hijacking: The PostgreSQL Attack You've Never Heard Of

search_path Hijacking: The PostgreSQL Attack You've Never Heard Of

Comments
2 min read
Getting Started with eslint-plugin-express-security
Cover image for Getting Started with eslint-plugin-express-security

Getting Started with eslint-plugin-express-security

Comments
3 min read
NFS, SMB, and File Sharing

NFS, SMB, and File Sharing

Comments
6 min read
Applying CIS Hardening for Linux Servers Using Ansible Automation

Applying CIS Hardening for Linux Servers Using Ansible Automation

Comments
4 min read
CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security
Cover image for CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

2
Comments
3 min read
VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

Comments
8 min read
Getting Started with eslint-plugin-browser-security
Cover image for Getting Started with eslint-plugin-browser-security

Getting Started with eslint-plugin-browser-security

Comments
2 min read
Getting Started with eslint-plugin-jwt
Cover image for Getting Started with eslint-plugin-jwt

Getting Started with eslint-plugin-jwt

Comments
3 min read
Getting Started with eslint-plugin-crypto
Cover image for Getting Started with eslint-plugin-crypto

Getting Started with eslint-plugin-crypto

Comments
2 min read
Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Comments
2 min read
How to Add Audit Logs to Your App (The Complete Guide for Developers)

How to Add Audit Logs to Your App (The Complete Guide for Developers)

Comments
3 min read
Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models
Cover image for Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models

Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models

2
Comments
2 min read
Security news weekly round-up - 12th December 2025
Cover image for Security news weekly round-up - 12th December 2025

Security news weekly round-up - 12th December 2025

2
Comments
3 min read
A Natural Language Interface for Datadog Log Search

A Natural Language Interface for Datadog Log Search

3
Comments
4 min read
loading...