Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
interview questions and answers

interview questions and answers

2
Comments
18 min read
CloudFormation change set privilege escalation
Cover image for CloudFormation change set privilege escalation

CloudFormation change set privilege escalation

6
Comments
3 min read
I Built a CLI to Test Supabase RLS Policies
Cover image for I Built a CLI to Test Supabase RLS Policies

I Built a CLI to Test Supabase RLS Policies

1
Comments
1 min read
Beyond Cost: Lessons from our Migration to Hetzner

Beyond Cost: Lessons from our Migration to Hetzner

1
Comments
10 min read
Security Principles | TryHackMe Write-Up

Security Principles | TryHackMe Write-Up

Comments
5 min read
When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson
Cover image for When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson

When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson

Comments
2 min read
Smart Security Camera

Smart Security Camera

Comments
2 min read
5 Common Security Mistakes Developers Still Make (and How to Fix Them)
Cover image for 5 Common Security Mistakes Developers Still Make (and How to Fix Them)

5 Common Security Mistakes Developers Still Make (and How to Fix Them)

2
Comments
5 min read
EnvSecOps: The Painfully Obvious Path Forward

EnvSecOps: The Painfully Obvious Path Forward

Comments
4 min read
The App You Trust Most Is the One That Spies the Hardest
Cover image for The App You Trust Most Is the One That Spies the Hardest

The App You Trust Most Is the One That Spies the Hardest

10
Comments
8 min read
Digital Ethics: The Dark Reality of Deepfakes

Digital Ethics: The Dark Reality of Deepfakes

Comments
2 min read
Cybersecurity Steganography: How Defenders Face Hidden Data

Cybersecurity Steganography: How Defenders Face Hidden Data

Comments
3 min read
How Simple IDs Can Leak Your Secrets

How Simple IDs Can Leak Your Secrets

Comments
3 min read
How to protect Express routes in Node.js
Cover image for How to protect Express routes in Node.js

How to protect Express routes in Node.js

2
Comments
4 min read
A simple way to encrypt sensitive data using python

A simple way to encrypt sensitive data using python

Comments
1 min read
Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core

Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core

Comments
4 min read
Signal Private Messenger Crypto Algorithm Double to Triple

Signal Private Messenger Crypto Algorithm Double to Triple

5
Comments
4 min read
Configuring Users and Permissions on Linux and Windows: A Complete Guide

Configuring Users and Permissions on Linux and Windows: A Complete Guide

Comments
6 min read
Protect Your Software Supply Chain with SBOMs – Security and Compliance

Protect Your Software Supply Chain with SBOMs – Security and Compliance

Comments
6 min read
🔒 Encapsulation in Java: Building Code That Protects Itself

🔒 Encapsulation in Java: Building Code That Protects Itself

Comments
3 min read
Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.
Cover image for Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

6
Comments
11 min read
From Setup to Role-Based Access — Building a Platform for Two Worlds

From Setup to Role-Based Access — Building a Platform for Two Worlds

Comments
1 min read
Check a list of IP addresses for proxies using IP2Proxy Dart

Check a list of IP addresses for proxies using IP2Proxy Dart

Comments
5 min read
Azure Landing Zone

Azure Landing Zone

2
Comments 2
14 min read
Math.random, friend or foe?
Cover image for Math.random, friend or foe?

Math.random, friend or foe?

8
Comments 4
5 min read
loading...