Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What Cybersecurity Professionals Have Learned From The Lockdown Experience

What Cybersecurity Professionals Have Learned From The Lockdown Experience

6
Comments
4 min read
JWTs: Which Signing Algorithm Should I Use?

JWTs: Which Signing Algorithm Should I Use?

10
Comments 3
10 min read
Reactive Security Filter with Spring & Kotlin
Cover image for Reactive Security Filter with Spring & Kotlin

Reactive Security Filter with Spring & Kotlin

10
Comments
4 min read
✋🏼🔥 CS Visualized: CORS
Cover image for ✋🏼🔥 CS Visualized: CORS

✋🏼🔥 CS Visualized: CORS

1576
Comments 86
9 min read
30D2R - April: Windows Exploitation Basics
Cover image for 30D2R - April: Windows Exploitation Basics

30D2R - April: Windows Exploitation Basics

3
Comments
4 min read
Firebase Firestore Rules with Custom Claims - an easy way

Firebase Firestore Rules with Custom Claims - an easy way

28
Comments 4
3 min read
4 ways to inject secrets into an application
Cover image for 4 ways to inject secrets into an application

4 ways to inject secrets into an application

10
Comments 2
2 min read
A Step-by-Step Guide to Setting Up a Node.js API With Passport-JWT

A Step-by-Step Guide to Setting Up a Node.js API With Passport-JWT

78
Comments 3
6 min read
Spring security using OAuth2 with AngularJs [JWT]

Spring security using OAuth2 with AngularJs [JWT]

7
Comments
3 min read
Bcrypt Step by Step

Bcrypt Step by Step

9
Comments
5 min read
Authenticating APIs with Cognito

Authenticating APIs with Cognito

4
Comments
2 min read
Randomness, what did you expect ?
Cover image for Randomness, what did you expect ?

Randomness, what did you expect ?

10
Comments 2
8 min read
Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!
Cover image for Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!

Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!

3
Comments 1
3 min read
Diana Initiative CTF

Diana Initiative CTF

8
Comments
7 min read
Azure Architecture Scenario: Protect an Azure App Service with a Cloud Hosted WAF (DNS Based)
Cover image for Azure Architecture Scenario: Protect an Azure App Service with a Cloud Hosted WAF (DNS Based)

Azure Architecture Scenario: Protect an Azure App Service with a Cloud Hosted WAF (DNS Based)

6
Comments
4 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

3
Comments
14 min read
If you’re not using SSH certificates you’re doing SSH wrong | Episode 1: Keys versus Certificates

If you’re not using SSH certificates you’re doing SSH wrong | Episode 1: Keys versus Certificates

37
Comments
5 min read
If you’re not using SSH certificates you’re doing SSH wrong | Episode 3: An ideal SSH flow

If you’re not using SSH certificates you’re doing SSH wrong | Episode 3: An ideal SSH flow

31
Comments 2
5 min read
Using sub-accounts in AWS

Using sub-accounts in AWS

5
Comments
4 min read
My Favorite Privacy Tools in 2020: Be Safer on the Internet!
Cover image for My Favorite Privacy Tools in 2020: Be Safer on the Internet!

My Favorite Privacy Tools in 2020: Be Safer on the Internet!

123
Comments 21
3 min read
Secure gRPC service with .NET Core and Azure Active Directory

Secure gRPC service with .NET Core and Azure Active Directory

17
Comments
6 min read
I created the official MLH Fellowhip CTF competition as a fellow
Cover image for I created the official MLH Fellowhip CTF competition as a fellow

I created the official MLH Fellowhip CTF competition as a fellow

25
Comments 1
4 min read
Dev tools for databases, what is out there?

Dev tools for databases, what is out there?

17
Comments 5
1 min read
Disable SSL certificate validation in Spring RestTemplate
Cover image for Disable SSL certificate validation in Spring RestTemplate

Disable SSL certificate validation in Spring RestTemplate

25
Comments 2
2 min read
noopener, noreferrer, and nofollow - When to use them? How can these prevent Phishing Attacks?
Cover image for noopener, noreferrer, and nofollow - When to use them? How can these prevent Phishing Attacks?

noopener, noreferrer, and nofollow - When to use them? How can these prevent Phishing Attacks?

11
Comments
6 min read
loading...