Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How To Hide Your .env While You're Livestreaming
Cover image for How To Hide Your .env While You're Livestreaming

How To Hide Your .env While You're Livestreaming

31
Comments 2
1 min read
Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know
Cover image for Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know

Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know

44
Comments
8 min read
Keeping things safe, using React Router !

Keeping things safe, using React Router !

7
Comments
2 min read
How to write an effective cloud security guideline

How to write an effective cloud security guideline

6
Comments
4 min read
Mobile Security Framework (MobSF) for automated Mobile security testing
Cover image for Mobile Security Framework (MobSF) for automated Mobile security testing

Mobile Security Framework (MobSF) for automated Mobile security testing

12
Comments
2 min read
OpenBSD httpd: Basic authentication with htpasswd

OpenBSD httpd: Basic authentication with htpasswd

7
Comments
1 min read
Security news weekly round-up - 30th July 2021
Cover image for Security news weekly round-up - 30th July 2021

Security news weekly round-up - 30th July 2021

2
Comments
4 min read
Azure DevOps: Limit User Visibility and Collaboration to Specific Projects
Cover image for Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

5
Comments 1
3 min read
Protect Your SignalR Service Based Real-time Application with Application Gateway
Cover image for Protect Your SignalR Service Based Real-time Application with Application Gateway

Protect Your SignalR Service Based Real-time Application with Application Gateway

18
Comments 10
6 min read
Openssl by Example

Openssl by Example

5
Comments
1 min read
Cross-site scripting (XSS) attack - part 3
Cover image for Cross-site scripting (XSS) attack - part 3

Cross-site scripting (XSS) attack - part 3

8
Comments
4 min read
Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts
Cover image for Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

14
Comments
2 min read
JP in da Kyiv, and crypto R&D internship pre-announcement
Cover image for JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
Authenticating Event Hubs publishers with SAS Token

Authenticating Event Hubs publishers with SAS Token

6
Comments
4 min read
The 10 most in-demand roles in the Information Security domain
Cover image for The 10 most in-demand roles in the Information Security domain

The 10 most in-demand roles in the Information Security domain

6
Comments
2 min read
Delete all users in an Azure AD Tenant programmatically

Delete all users in an Azure AD Tenant programmatically

8
Comments
4 min read
Delete an Azure AD B2C tenant programmatically

Delete an Azure AD B2C tenant programmatically

8
Comments
2 min read
Let's Make a Security Camera using your smartphone [2021]
Cover image for Let's Make a Security Camera using your smartphone [2021]

Let's Make a Security Camera using your smartphone [2021]

3
Comments 1
1 min read
Who's responsible for securing software?
Cover image for Who's responsible for securing software?

Who's responsible for securing software?

3
Comments
2 min read
AWS: Route53 Private Hosted Zones — hiding domains from the Internet

AWS: Route53 Private Hosted Zones — hiding domains from the Internet

2
Comments
4 min read
Stealthy Code Injection in a Running .NET Process

Stealthy Code Injection in a Running .NET Process

12
Comments
8 min read
Pentesting detection on EDR
Cover image for Pentesting detection on EDR

Pentesting detection on EDR

19
Comments
2 min read
Securing Azure SignalR +Azure App Service - Part 4
Cover image for Securing Azure SignalR +Azure App Service - Part 4

Securing Azure SignalR +Azure App Service - Part 4

3
Comments 1
2 min read
What is a security champion and do you need one?

What is a security champion and do you need one?

2
Comments
3 min read
2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.
Cover image for 2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

3
Comments
7 min read
loading...