Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why You Should Use 310,000+ Iterations with PBKDF2 in 2025

Why You Should Use 310,000+ Iterations with PBKDF2 in 2025

2
Comments
3 min read
I Thought My API Was Secure. I Was Wrong.

I Thought My API Was Secure. I Was Wrong.

Comments
1 min read
What We Learned from Subjecting LikhaERP to Independent VAPT Testing
Cover image for What We Learned from Subjecting LikhaERP to Independent VAPT Testing

What We Learned from Subjecting LikhaERP to Independent VAPT Testing

Comments 1
3 min read
How Modern Operators Use Psychology To Map Targets Before First Contact
Cover image for How Modern Operators Use Psychology To Map Targets Before First Contact

How Modern Operators Use Psychology To Map Targets Before First Contact

7
Comments
7 min read
What Is A DMARC? How It Protects Your Domain From Phishing And Spoofing
Cover image for What Is A DMARC? How It Protects Your Domain From Phishing And Spoofing

What Is A DMARC? How It Protects Your Domain From Phishing And Spoofing

Comments
3 min read
A lightweight secrets scanner that catches exposed keys before they reach GitHub
Cover image for A lightweight secrets scanner that catches exposed keys before they reach GitHub

A lightweight secrets scanner that catches exposed keys before they reach GitHub

2
Comments
2 min read
System Design - Authentication

System Design - Authentication

Comments
2 min read
Cracking the Vault: A Nostalgic Hack at Zero Nights 2017 🚪💻
Cover image for Cracking the Vault: A Nostalgic Hack at Zero Nights 2017 🚪💻

Cracking the Vault: A Nostalgic Hack at Zero Nights 2017 🚪💻

1
Comments
9 min read
Finding Vulnerabilities on EC2 Instances Using AWS Inspector

Finding Vulnerabilities on EC2 Instances Using AWS Inspector

Comments
5 min read
Security Observability in Kubernetes Goes Beyond Logs
Cover image for Security Observability in Kubernetes Goes Beyond Logs

Security Observability in Kubernetes Goes Beyond Logs

Comments
13 min read
Critical Vulnerability in v380 Cameras: How Plaintext Credentials Exposed Millions of Devices

Critical Vulnerability in v380 Cameras: How Plaintext Credentials Exposed Millions of Devices

5
Comments
18 min read
How to Change a Logged-In User’s Password and Log Out All Active Sessions in Supabase
Cover image for How to Change a Logged-In User’s Password and Log Out All Active Sessions in Supabase

How to Change a Logged-In User’s Password and Log Out All Active Sessions in Supabase

Comments
2 min read
I Built a 'Sudo' Command for AI Agents (and Why You Need It)
Cover image for I Built a 'Sudo' Command for AI Agents (and Why You Need It)

I Built a 'Sudo' Command for AI Agents (and Why You Need It)

1
Comments
4 min read
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

1
Comments
7 min read
Docker Run İle SSL Sertifikalı Keycloak Kurma

Docker Run İle SSL Sertifikalı Keycloak Kurma

1
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.