Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Pentesting detection on EDR
Cover image for Pentesting detection on EDR

Pentesting detection on EDR

19
Comments
2 min read
Securing Azure SignalR +Azure App Service - Part 4
Cover image for Securing Azure SignalR +Azure App Service - Part 4

Securing Azure SignalR +Azure App Service - Part 4

3
Comments 1
2 min read
What is a security champion and do you need one?

What is a security champion and do you need one?

2
Comments
3 min read
2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.
Cover image for 2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

3
Comments
7 min read
Cross-site scripting (XSS) attack - Part 2
Cover image for Cross-site scripting (XSS) attack - Part 2

Cross-site scripting (XSS) attack - Part 2

27
Comments
4 min read
Landing Zones, Organizations, OUs and Multi-Account Environments

Landing Zones, Organizations, OUs and Multi-Account Environments

14
Comments 1
5 min read
Secure Open API (Swagger) calls with Azure Active Directory

Secure Open API (Swagger) calls with Azure Active Directory

20
Comments 11
3 min read
Updates for SQL Injection in Rails 6.1

Updates for SQL Injection in Rails 6.1

11
Comments
3 min read
How to approach DevSecOps security automation

How to approach DevSecOps security automation

4
Comments
4 min read
Installing Krypt.co on NVIDIA Jetson Nano
Cover image for Installing Krypt.co on NVIDIA Jetson Nano

Installing Krypt.co on NVIDIA Jetson Nano

3
Comments
4 min read
Verifying JWTs with JWKS in Ruby

Verifying JWTs with JWKS in Ruby

3
Comments
5 min read
How to set GitHub Actions's `permissions`?

How to set GitHub Actions's `permissions`?

10
Comments 1
2 min read
Cross-site scripting (XSS) attack - Part 1
Cover image for Cross-site scripting (XSS) attack - Part 1

Cross-site scripting (XSS) attack - Part 1

80
Comments
4 min read
More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager
Cover image for More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

2
Comments
4 min read
On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

23
Comments 35
8 min read
Passman - a password manager for the command line

Passman - a password manager for the command line

2
Comments
1 min read
How to add a login form to any website, without a single line of code
Cover image for How to add a login form to any website, without a single line of code

How to add a login form to any website, without a single line of code

5
Comments
6 min read
AWS: Web Application Firewall overview, configuration, and its monitoring

AWS: Web Application Firewall overview, configuration, and its monitoring

8
Comments
16 min read
Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series
Cover image for Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

16
Comments
4 min read
Managing remote servers with SSH and SFTP connections: a step-by-step guide
Cover image for Managing remote servers with SSH and SFTP connections: a step-by-step guide

Managing remote servers with SSH and SFTP connections: a step-by-step guide

14
Comments
12 min read
Using Open Source Tools at Your Company w/ Doron Gill of Logz.io
Cover image for Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

5
Comments
1 min read
IvyFinal CTF (Crypto 3) - Silly 400 - points

IvyFinal CTF (Crypto 3) - Silly 400 - points

5
Comments
2 min read
Top Information Gathering Methods Explained
Cover image for Top Information Gathering Methods Explained

Top Information Gathering Methods Explained

3
Comments
4 min read
Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

17
Comments
6 min read
Security news weekly round-up - 16th July 2021
Cover image for Security news weekly round-up - 16th July 2021

Security news weekly round-up - 16th July 2021

2
Comments
3 min read
loading...