Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 25th September 2020
Cover image for Security news weekly round-up - 25th September 2020

Security news weekly round-up - 25th September 2020

3
Comments
3 min read
A (secret) way to bypass Chrome's security/privacy error
Cover image for A (secret) way to bypass Chrome's security/privacy error

A (secret) way to bypass Chrome's security/privacy error

23
Comments 1
1 min read
Vaccines for Common SQL Injection Bugs
Cover image for Vaccines for Common SQL Injection Bugs

Vaccines for Common SQL Injection Bugs

4
Comments
2 min read
Can you use Ruby in Bug Bounty?

Can you use Ruby in Bug Bounty?

5
Comments 2
1 min read
How to monitorize program execution on Windows using Wazuh and sysmon.

How to monitorize program execution on Windows using Wazuh and sysmon.

5
Comments
3 min read
Securing our Serverless Apps on Azure
Cover image for Securing our Serverless Apps on Azure

Securing our Serverless Apps on Azure

3
Comments
1 min read
3 sets of Cybersecurity challenges & answers (CTF) to learn from
Cover image for 3 sets of Cybersecurity challenges & answers (CTF) to learn from

3 sets of Cybersecurity challenges & answers (CTF) to learn from

28
Comments
2 min read
Why Do Certificate Revocation Checking Mechanisms Never Work?
Cover image for Why Do Certificate Revocation Checking Mechanisms Never Work?

Why Do Certificate Revocation Checking Mechanisms Never Work?

2
Comments
18 min read
On .NET Episode: Securing Services with MSAL
Cover image for On .NET Episode: Securing Services with MSAL

On .NET Episode: Securing Services with MSAL

11
Comments
1 min read
A Field Guide to CoAP, Part 1
Cover image for A Field Guide to CoAP, Part 1

A Field Guide to CoAP, Part 1

5
Comments
8 min read
How to Integrate Security Into a DevOps Cycle
Cover image for How to Integrate Security Into a DevOps Cycle

How to Integrate Security Into a DevOps Cycle

13
Comments
5 min read
Are you worried about Security at the Application Layer?
Cover image for Are you worried about Security at the Application Layer?

Are you worried about Security at the Application Layer?

9
Comments
4 min read
Approov Serverless Reverse Proxy in the AWS API Gateway
Cover image for Approov Serverless Reverse Proxy in the AWS API Gateway

Approov Serverless Reverse Proxy in the AWS API Gateway

4
Comments
10 min read
How create a discipline routine for learn development!

How create a discipline routine for learn development!

3
Comments 1
1 min read
A Practical Guide to AWS IAM
Cover image for A Practical Guide to AWS IAM

A Practical Guide to AWS IAM

3
Comments 2
1 min read
Secure SDLC and Best Practices for Outsourcing
Cover image for Secure SDLC and Best Practices for Outsourcing

Secure SDLC and Best Practices for Outsourcing

7
Comments
6 min read
CodeQL Analysis on GitHub
Cover image for CodeQL Analysis on GitHub

CodeQL Analysis on GitHub

5
Comments
2 min read
Infrastructure as code leads to Security as code
Cover image for Infrastructure as code leads to Security as code

Infrastructure as code leads to Security as code

11
Comments
5 min read
How to share a secret?
Cover image for How to share a secret?

How to share a secret?

58
Comments
4 min read
Generating a Self Signed Certificate using Powershell
Cover image for Generating a Self Signed Certificate using Powershell

Generating a Self Signed Certificate using Powershell

9
Comments
1 min read
SPFx issues with the new Referrer-Policy in Chrome >= 85
Cover image for SPFx issues with the new Referrer-Policy in Chrome >= 85

SPFx issues with the new Referrer-Policy in Chrome >= 85

3
Comments
2 min read
All you need to know about TERMUX

All you need to know about TERMUX

24
Comments
2 min read
OAuth 2.0 Resources You Can Actually Understand

OAuth 2.0 Resources You Can Actually Understand

148
Comments 3
3 min read
Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1
Cover image for Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

6
Comments 1
2 min read
How to Securely Access The Dark Web in 15 Steps. Second Part

How to Securely Access The Dark Web in 15 Steps. Second Part

8
Comments
9 min read
loading...