Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Node.js Security Basics: Rate Limiting, Input Sanitization, and Helmet Setup

Node.js Security Basics: Rate Limiting, Input Sanitization, and Helmet Setup

1
Comments
3 min read
WordPress vs. Managed WordPress Hosting: Which to Choose in 2025?
Cover image for WordPress vs. Managed WordPress Hosting: Which to Choose in 2025?

WordPress vs. Managed WordPress Hosting: Which to Choose in 2025?

1
Comments 1
2 min read
Cryptography in 2025: The Quantum Leap and the AI Arms Race

Cryptography in 2025: The Quantum Leap and the AI Arms Race

Comments
3 min read
Nuxt Scripts for improved Performance and Security
Cover image for Nuxt Scripts for improved Performance and Security

Nuxt Scripts for improved Performance and Security

3
Comments
3 min read
The Hidden Threat in Every Image: Why Your Upload Validation is Broken
Cover image for The Hidden Threat in Every Image: Why Your Upload Validation is Broken

The Hidden Threat in Every Image: Why Your Upload Validation is Broken

47
Comments 3
8 min read
Python For Exploit Development
Cover image for Python For Exploit Development

Python For Exploit Development

Comments
7 min read
Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI
Cover image for Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI

Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI

Comments
3 min read
Creating production-ready authentication and authorization

Creating production-ready authentication and authorization

Comments
3 min read
Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Comments
1 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness
Cover image for Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
Agent Factory Recap: Can you do my shopping?

Agent Factory Recap: Can you do my shopping?

16
Comments
7 min read
How to Secure RabbitMQ & Celery with TLS/SSL

How to Secure RabbitMQ & Celery with TLS/SSL

Comments
1 min read
AWS DevSecOps: Deep Dive into Software Development, Security, and Operations Integration

AWS DevSecOps: Deep Dive into Software Development, Security, and Operations Integration

Comments
7 min read
Hands-On: See Image Metadata Removal in Action
Cover image for Hands-On: See Image Metadata Removal in Action

Hands-On: See Image Metadata Removal in Action

120
Comments 2
6 min read
Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter
Cover image for Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter

Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter

1
Comments
3 min read
Building Own Block Cipher: Part 2 — Block Cipher Theory & Rebuilding DES (Foundations You Can See)
Cover image for Building Own Block Cipher: Part 2 — Block Cipher Theory & Rebuilding DES (Foundations You Can See)

Building Own Block Cipher: Part 2 — Block Cipher Theory & Rebuilding DES (Foundations You Can See)

Comments
6 min read
Safety vs Security in Software: A Practical Guide for Engineers and Infrastructure Teams
Cover image for Safety vs Security in Software: A Practical Guide for Engineers and Infrastructure Teams

Safety vs Security in Software: A Practical Guide for Engineers and Infrastructure Teams

Comments
9 min read
Why Some Android Games Resist Naïve Reverse Engineering

Why Some Android Games Resist Naïve Reverse Engineering

1
Comments
5 min read
How to Use Amazon SNS Data Protection Policies to Prevent Sensitive Data Leakage
Cover image for How to Use Amazon SNS Data Protection Policies to Prevent Sensitive Data Leakage

How to Use Amazon SNS Data Protection Policies to Prevent Sensitive Data Leakage

2
Comments
4 min read
Your ESLint Security Plugin is Missing 80% of Vulnerabilities (I Have Proof)
Cover image for Your ESLint Security Plugin is Missing 80% of Vulnerabilities (I Have Proof)

Your ESLint Security Plugin is Missing 80% of Vulnerabilities (I Have Proof)

Comments
5 min read
How to Test Image Rebuilding API: A Step-by-Step Guide
Cover image for How to Test Image Rebuilding API: A Step-by-Step Guide

How to Test Image Rebuilding API: A Step-by-Step Guide

104
Comments 2
4 min read
Matrix vs Signal Protocol: Why We Chose NOT to Federate

Matrix vs Signal Protocol: Why We Chose NOT to Federate

Comments
3 min read
Why another exchange architecture post?

Why another exchange architecture post?

Comments
8 min read
Why We Built Authentication Without Accounts, Passwords, or Personal Data

Why We Built Authentication Without Accounts, Passwords, or Personal Data

9
Comments 7
2 min read
Why is a secure PDF manipulation tool essential?
Cover image for Why is a secure PDF manipulation tool essential?

Why is a secure PDF manipulation tool essential?

Comments
2 min read
loading...