Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Low-Hanging Fruits of Web Security
Cover image for Low-Hanging Fruits of Web Security

Low-Hanging Fruits of Web Security

46
Comments 2
3 min read
Introduction to AWS and AWS Compute Services
Cover image for Introduction to AWS and AWS Compute Services

Introduction to AWS and AWS Compute Services

11
Comments 5
14 min read
Bandit CTF - 1 to 5 Challenges WriteUp
Cover image for Bandit CTF - 1 to 5 Challenges WriteUp

Bandit CTF - 1 to 5 Challenges WriteUp

6
Comments
2 min read
Understanding Unikernels: The Future of Cloud Computing, Probably
Cover image for Understanding Unikernels: The Future of Cloud Computing, Probably

Understanding Unikernels: The Future of Cloud Computing, Probably

21
Comments
7 min read
Email Encryption: What it is, How Does It Work, and How to Encrypt an Email
Cover image for Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

5
Comments 4
6 min read
Keep Your Javascript Projects Secure With Snyk
Cover image for Keep Your Javascript Projects Secure With Snyk

Keep Your Javascript Projects Secure With Snyk

22
Comments 4
3 min read
Implementing End to End Encryption in your Cross Platform App
Cover image for Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

12
Comments
3 min read
Kubestriker - A Blazing fast Security Auditing tool for kubernetes!!
Cover image for Kubestriker - A Blazing fast Security Auditing tool for kubernetes!!

Kubestriker - A Blazing fast Security Auditing tool for kubernetes!!

6
Comments
6 min read
Authentication vs. Authorization
Cover image for Authentication vs. Authorization

Authentication vs. Authorization

161
Comments 4
2 min read
Secure Cookies in 5 steps

Secure Cookies in 5 steps

14
Comments
2 min read
Do you know what open source dependencies your teams are using?
Cover image for Do you know what open source dependencies your teams are using?

Do you know what open source dependencies your teams are using?

7
Comments 3
4 min read
Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)
Cover image for Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

4
Comments 1
4 min read
Criando e gerenciando usuários no Kubernetes
Cover image for Criando e gerenciando usuários no Kubernetes

Criando e gerenciando usuários no Kubernetes

13
Comments
10 min read
How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 2/2)
Cover image for How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 2/2)

How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 2/2)

5
Comments
7 min read
Hack The Box: Invite Challenge
Cover image for Hack The Box: Invite Challenge

Hack The Box: Invite Challenge

8
Comments
3 min read
Crypto-mining attack in my GitHub actions through Pull Request
Cover image for Crypto-mining attack in my GitHub actions through Pull Request

Crypto-mining attack in my GitHub actions through Pull Request

45
Comments 20
8 min read
How TLS and HTTPS Work - Plus a Handful of Useful Tools
Cover image for How TLS and HTTPS Work - Plus a Handful of Useful Tools

How TLS and HTTPS Work - Plus a Handful of Useful Tools

4
Comments
1 min read
Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)
Cover image for Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

9
Comments 2
4 min read
Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)
Cover image for Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

10
Comments 5
3 min read
Top 10 Extensions You Must Use For Your Privacy

Top 10 Extensions You Must Use For Your Privacy

9
Comments
6 min read
secure password holder

secure password holder

2
Comments
2 min read
Explaining Authentication Security Issues through Memes!

Explaining Authentication Security Issues through Memes!

4
Comments
2 min read
Java Syntax Puzzlers

Java Syntax Puzzlers

6
Comments 1
6 min read
Modernize your legacy API authentication with Microsoft.Identity.Web and Azure AD

Modernize your legacy API authentication with Microsoft.Identity.Web and Azure AD

11
Comments
3 min read
Would you use target="_blank"? And how many rels?

Would you use target="_blank"? And how many rels?

6
Comments 2
1 min read
loading...