Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Do Surveillance Systems Affect Identity in South Asia?

How Do Surveillance Systems Affect Identity in South Asia?

Comments
3 min read
Stop Using AWS Access Keys in GitHub Actions: The OIDC Guide You Need
Cover image for Stop Using AWS Access Keys in GitHub Actions: The OIDC Guide You Need

Stop Using AWS Access Keys in GitHub Actions: The OIDC Guide You Need

23
Comments
5 min read
Azure Static Web Apps: login_hint with Azure Functions v1

Azure Static Web Apps: login_hint with Azure Functions v1

Comments
5 min read
Improving Container Security with Docker Hardened Images
Cover image for Improving Container Security with Docker Hardened Images

Improving Container Security with Docker Hardened Images

17
Comments
6 min read
Code Smell 317 - Email Handling Vulnerabilities
Cover image for Code Smell 317 - Email Handling Vulnerabilities

Code Smell 317 - Email Handling Vulnerabilities

2
Comments
14 min read
Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

1
Comments
6 min read
Why Your UEBA Isn’t Working (and how to fix it)
Cover image for Why Your UEBA Isn’t Working (and how to fix it)

Why Your UEBA Isn’t Working (and how to fix it)

1
Comments
7 min read
I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How
Cover image for I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How

I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How

Comments
10 min read
Introducing YD Shomer (י שומר) - Runtime SQL Guardian for PHP

Introducing YD Shomer (י שומר) - Runtime SQL Guardian for PHP

Comments
1 min read
Using Amp (AI) For Static Code Analysis

Using Amp (AI) For Static Code Analysis

Comments
4 min read
Beyond the Code: Advanced Human-Led Techniques in DeFi Security Auditing
Cover image for Beyond the Code: Advanced Human-Led Techniques in DeFi Security Auditing

Beyond the Code: Advanced Human-Led Techniques in DeFi Security Auditing

Comments
10 min read
TimeProofs v0.1 — A Free, Privacy-First Timestamp API for Developers (Public Beta)
Cover image for TimeProofs v0.1 — A Free, Privacy-First Timestamp API for Developers (Public Beta)

TimeProofs v0.1 — A Free, Privacy-First Timestamp API for Developers (Public Beta)

Comments
3 min read
WhatsApp Ghost Pairing: A Silent Abuse of Linked Devices
Cover image for WhatsApp Ghost Pairing: A Silent Abuse of Linked Devices

WhatsApp Ghost Pairing: A Silent Abuse of Linked Devices

Comments
2 min read
The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

3
Comments
5 min read
🛡️ Entendiendo las Service Control Policies (SCPs) en AWS Organizations
Cover image for 🛡️ Entendiendo las Service Control Policies (SCPs) en AWS Organizations

🛡️ Entendiendo las Service Control Policies (SCPs) en AWS Organizations

2
Comments
11 min read
Bypassing Web Application Firewalls

Bypassing Web Application Firewalls

3
Comments
5 min read
Building Ephemeral Notes: Cryptography That Respects Reality
Cover image for Building Ephemeral Notes: Cryptography That Respects Reality

Building Ephemeral Notes: Cryptography That Respects Reality

1
Comments 2
6 min read
IRP: The Semantic Model That Fixes AI-Native API Chaos

IRP: The Semantic Model That Fixes AI-Native API Chaos

Comments
2 min read
Secrets Management: Vault, AWS Secrets Manager, or SOPS?

Secrets Management: Vault, AWS Secrets Manager, or SOPS?

Comments
11 min read
Designing a Zero-Trust Personal Information Manager with Client-Side Encryption
Cover image for Designing a Zero-Trust Personal Information Manager with Client-Side Encryption

Designing a Zero-Trust Personal Information Manager with Client-Side Encryption

14
Comments 10
6 min read
Emergency Server Recovery: A 4-Hour Race Against Time
Cover image for Emergency Server Recovery: A 4-Hour Race Against Time

Emergency Server Recovery: A 4-Hour Race Against Time

Comments
4 min read
Understanding Content Security Policy (CSP)
Cover image for Understanding Content Security Policy (CSP)

Understanding Content Security Policy (CSP)

Comments
9 min read
Análise de Vetores de Ataque em Arquitetura de Aplicações Web
Cover image for Análise de Vetores de Ataque em Arquitetura de Aplicações Web

Análise de Vetores de Ataque em Arquitetura de Aplicações Web

1
Comments
17 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Cover image for The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Image Scanning Tools (Anchore, Clair)

Image Scanning Tools (Anchore, Clair)

Comments
6 min read
loading...