Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building API Authentication System with Laravel 12 & Sanctum: Register, Login, OTP & Password Reset

Building API Authentication System with Laravel 12 & Sanctum: Register, Login, OTP & Password Reset

1
Comments
12 min read
Understanding HttpOnly Cookies in Depth

Understanding HttpOnly Cookies in Depth

Comments
2 min read
Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

4
Comments
9 min read
The Silent Threat: Visually Triggered AI Hijacking

The Silent Threat: Visually Triggered AI Hijacking

Comments
2 min read
Using Podman as a Docker alternative

Using Podman as a Docker alternative

Comments
5 min read
The Dark Side of Automation: When "Auto" Breaks Your Security Model
Cover image for The Dark Side of Automation: When "Auto" Breaks Your Security Model

The Dark Side of Automation: When "Auto" Breaks Your Security Model

Comments
7 min read
📰 Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools
Cover image for 📰 Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools

📰 Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools

11
Comments
6 min read
Securing Container Registries: Best Practices for Safe Image Management

Securing Container Registries: Best Practices for Safe Image Management

Comments
2 min read
The Quantum Threat Nobody's Taking Seriously (But Should)
Cover image for The Quantum Threat Nobody's Taking Seriously (But Should)

The Quantum Threat Nobody's Taking Seriously (But Should)

Comments
3 min read
A Developer's Guide to Useful Apache Modules

A Developer's Guide to Useful Apache Modules

5
Comments
3 min read
Trusted Publishers: Making Package Publishing Safer – What You Need to Know

Trusted Publishers: Making Package Publishing Safer – What You Need to Know

Comments
5 min read
Returning HTTP 404 Responses Instead of 403 for Unauthorised Access
Cover image for Returning HTTP 404 Responses Instead of 403 for Unauthorised Access

Returning HTTP 404 Responses Instead of 403 for Unauthorised Access

15
Comments 13
8 min read
POR QUÉ UN FONDO DE EMERGENCIA PUEDE SALVAR TUS FINANZAS

POR QUÉ UN FONDO DE EMERGENCIA PUEDE SALVAR TUS FINANZAS

Comments
2 min read
📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage
Cover image for 📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage

📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage

21
Comments 2
5 min read
Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple
Cover image for Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple

Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple

Comments
3 min read
Why We Used a Data Gateway to Connect On-Prem SQL with Microsoft Fabric

Why We Used a Data Gateway to Connect On-Prem SQL with Microsoft Fabric

Comments
2 min read
Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

1
Comments
10 min read
🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain
Cover image for 🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

5
Comments
3 min read
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture
Cover image for Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

18
Comments 2
9 min read
Building APIs with a Zero Trust Policy: Protecting Your Data Like Your Peace
Cover image for Building APIs with a Zero Trust Policy: Protecting Your Data Like Your Peace

Building APIs with a Zero Trust Policy: Protecting Your Data Like Your Peace

7
Comments
5 min read
Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Comments
3 min read
What if we improve the way developers are given access to databases

What if we improve the way developers are given access to databases

Comments
4 min read
Major Tech News: October 1, 2025

Major Tech News: October 1, 2025

Comments
2 min read
Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Comments
2 min read
GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

9
Comments
5 min read
loading...