Forem

Security

Hopefully not just an afterthought!

Posts

πŸ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
JWT Authentication Deep Dive: Creation, Storage, and Verification
Cover image for JWT Authentication Deep Dive: Creation, Storage, and Verification

JWT Authentication Deep Dive: Creation, Storage, and Verification

1
Comments
4 min read
How does Authentication work & different types

How does Authentication work & different types

Comments
2 min read
Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control
Cover image for Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

5
Comments
3 min read
IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover
Cover image for IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

Comments
3 min read
15 Laravel Security Best Practices You Should Follow in 2025
Cover image for 15 Laravel Security Best Practices You Should Follow in 2025

15 Laravel Security Best Practices You Should Follow in 2025

Comments
2 min read
How BoldSign Ensures UETA Compliance for Electronic Signatures
Cover image for How BoldSign Ensures UETA Compliance for Electronic Signatures

How BoldSign Ensures UETA Compliance for Electronic Signatures

3
Comments
3 min read
How to Protect the SafeLine Management Interface

How to Protect the SafeLine Management Interface

5
Comments
1 min read
Breaking The Unbreakable: Bypassing Arkose Labs on iOS
Cover image for Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Comments
7 min read
Wazuh: Your Open-Source Security Superhero
Cover image for Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments
3 min read
Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite
Cover image for Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite

Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite

Comments
4 min read
Go & AES-GCM: A Security Deep Dive

Go & AES-GCM: A Security Deep Dive

Comments
4 min read
What is Rate Limiting and How to Add It in Django
Cover image for What is Rate Limiting and How to Add It in Django

What is Rate Limiting and How to Add It in Django

1
Comments
2 min read
(β…‘)【Report Review】2024 OWASP Mobile Top 10 Risks
Cover image for (β…‘)【Report Review】2024 OWASP Mobile Top 10 Risks

(β…‘)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

11
Comments 4
11 min read
What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

6
Comments
3 min read
AICHA: AI-Powered Healthcare Assistant with Permit.io Authorization

AICHA: AI-Powered Healthcare Assistant with Permit.io Authorization

1
Comments
10 min read
Understanding MCP and Its Security Implications

Understanding MCP and Its Security Implications

Comments
4 min read
Building a Secret Scanner in Julia: A GitLeaks Alternative
Cover image for Building a Secret Scanner in Julia: A GitLeaks Alternative

Building a Secret Scanner in Julia: A GitLeaks Alternative

Comments
4 min read
Securing AI Document Systems: Implementing the Four-Perimeter Framework with Permit.io
Cover image for Securing AI Document Systems: Implementing the Four-Perimeter Framework with Permit.io

Securing AI Document Systems: Implementing the Four-Perimeter Framework with Permit.io

6
Comments 3
6 min read
leftpad, vibe-coding e o mercado que corta custos a qualquer custo
Cover image for leftpad, vibe-coding e o mercado que corta custos a qualquer custo

leftpad, vibe-coding e o mercado que corta custos a qualquer custo

1
Comments
3 min read
What is a CDN? The Secret Sauce Behind Fast Internet (Explained in 5 Minutes)
Cover image for What is a CDN? The Secret Sauce Behind Fast Internet (Explained in 5 Minutes)

What is a CDN? The Secret Sauce Behind Fast Internet (Explained in 5 Minutes)

2
Comments
5 min read
Security Showdown: GitHub Actions vs. GitLab CI vs. Jenkins – Who Keeps Your Secrets Safe?

Security Showdown: GitHub Actions vs. GitLab CI vs. Jenkins – Who Keeps Your Secrets Safe?

Comments
3 min read
Secure Admin Setup Without a Database (for Now!)
Cover image for Secure Admin Setup Without a Database (for Now!)

Secure Admin Setup Without a Database (for Now!)

Comments
3 min read
curl, it's got u

curl, it's got u

1
Comments
2 min read
MCP Security: Tr-tr-tr-tricky, tricky, tricky

MCP Security: Tr-tr-tr-tricky, tricky, tricky

12
Comments 1
4 min read
loading...