Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🛡️ Ethical Hacking Lab Walkthrough: Website Cloning & SMB Enumeration (Beginner-Friendly)

🛡️ Ethical Hacking Lab Walkthrough: Website Cloning & SMB Enumeration (Beginner-Friendly)

Comments
4 min read
Building a Cost-Effective Autonomous Threat Containment System on AWS
Cover image for Building a Cost-Effective Autonomous Threat Containment System on AWS

Building a Cost-Effective Autonomous Threat Containment System on AWS

Comments
4 min read
🔐 Week 4 Scripting Challenge: Build an Auth Log Failed Login Scraper in Python

🔐 Week 4 Scripting Challenge: Build an Auth Log Failed Login Scraper in Python

2
Comments 2
12 min read
Securing My Stack: Features and Experience Integrating Asgardeo, Ballerina, and Choreo

Securing My Stack: Features and Experience Integrating Asgardeo, Ballerina, and Choreo

Comments
3 min read
Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Comments
2 min read
NodeJS 101 —  Part 4 🔐 Authorization with JWT

NodeJS 101 —  Part 4 🔐 Authorization with JWT

1
Comments
4 min read
From PKIX errors to a clean mTLS + Feign + IAM demo
Cover image for From PKIX errors to a clean mTLS + Feign + IAM demo

From PKIX errors to a clean mTLS + Feign + IAM demo

Comments
4 min read
My First Ethical Open Redirect Scanner: From Zero to Shipped

My First Ethical Open Redirect Scanner: From Zero to Shipped

6
Comments
3 min read
Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work
Cover image for Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work

Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work

Comments 1
3 min read
Technical Overview of Infrared Thermography for Electrical Systems

Technical Overview of Infrared Thermography for Electrical Systems

Comments 2
3 min read
how do you trust a third party API?
Cover image for how do you trust a third party API?

how do you trust a third party API?

Comments 1
2 min read
I was tired of copying .env files between machines, so we built a CLI

I was tired of copying .env files between machines, so we built a CLI

Comments
1 min read
Building SENTINEL: How I Turned Network Packets Into Ghosts

Building SENTINEL: How I Turned Network Packets Into Ghosts

Comments
8 min read
How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare
Cover image for How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

Comments
3 min read
Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.