Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How 4 lines of Java code end up in 518772 lines in production.
Cover image for How 4 lines of Java code end up in 518772 lines in production.

How 4 lines of Java code end up in 518772 lines in production.

60
Comments 13
3 min read
CVE Binary Tool: GSoC Final Report
Cover image for CVE Binary Tool: GSoC Final Report

CVE Binary Tool: GSoC Final Report

7
Comments 1
6 min read
Spring security with JWT based login [Without OAuth]

Spring security with JWT based login [Without OAuth]

3
Comments
1 min read
CORS in short
Cover image for CORS in short

CORS in short

8
Comments
1 min read
3 Static Application Security Testing advantages (SAST) You Should Know
Cover image for 3 Static Application Security Testing advantages (SAST) You Should Know

3 Static Application Security Testing advantages (SAST) You Should Know

8
Comments 1
4 min read
Today's rabbit hole: securing JWTs for authentication, httpOnly cookies, CSRF tokens, secrets & more
Cover image for Today's rabbit hole: securing JWTs for authentication, httpOnly cookies, CSRF tokens, secrets & more

Today's rabbit hole: securing JWTs for authentication, httpOnly cookies, CSRF tokens, secrets & more

44
Comments 9
11 min read
Fundamentals of Vulnerability Management with Open Source Tools

Fundamentals of Vulnerability Management with Open Source Tools

3
Comments 2
8 min read
Using HTTP headers to debug live sites

Using HTTP headers to debug live sites

7
Comments
4 min read
Hide your api keys from your android manifest file with Flutter using local.properties
Cover image for Hide your api keys from your android manifest file with Flutter using local.properties

Hide your api keys from your android manifest file with Flutter using local.properties

25
Comments 7
2 min read
If you’re not using SSH certificates you’re doing SSH wrong | Episode 2: Certificates improve usability, operability, & security

If you’re not using SSH certificates you’re doing SSH wrong | Episode 2: Certificates improve usability, operability, & security

111
Comments 4
6 min read
JSON Web Token: Authorization RESTful API by using JWT
Cover image for JSON Web Token: Authorization RESTful API by using JWT

JSON Web Token: Authorization RESTful API by using JWT

7
Comments
3 min read
A Story of Rusty Containers, Queues, and the Role of Assumed Identity
Cover image for A Story of Rusty Containers, Queues, and the Role of Assumed Identity

A Story of Rusty Containers, Queues, and the Role of Assumed Identity

20
Comments
14 min read
What Cybersecurity Professionals Have Learned From The Lockdown Experience

What Cybersecurity Professionals Have Learned From The Lockdown Experience

6
Comments
4 min read
JWTs: Which Signing Algorithm Should I Use?

JWTs: Which Signing Algorithm Should I Use?

10
Comments 3
10 min read
Reactive Security Filter with Spring & Kotlin
Cover image for Reactive Security Filter with Spring & Kotlin

Reactive Security Filter with Spring & Kotlin

10
Comments
4 min read
✋🏼🔥 CS Visualized: CORS
Cover image for ✋🏼🔥 CS Visualized: CORS

✋🏼🔥 CS Visualized: CORS

1576
Comments 86
9 min read
30D2R - April: Windows Exploitation Basics
Cover image for 30D2R - April: Windows Exploitation Basics

30D2R - April: Windows Exploitation Basics

3
Comments
4 min read
Firebase Firestore Rules with Custom Claims - an easy way

Firebase Firestore Rules with Custom Claims - an easy way

28
Comments 4
3 min read
4 ways to inject secrets into an application
Cover image for 4 ways to inject secrets into an application

4 ways to inject secrets into an application

10
Comments 2
2 min read
A Step-by-Step Guide to Setting Up a Node.js API With Passport-JWT

A Step-by-Step Guide to Setting Up a Node.js API With Passport-JWT

78
Comments 3
6 min read
Spring security using OAuth2 with AngularJs [JWT]

Spring security using OAuth2 with AngularJs [JWT]

7
Comments
3 min read
Bcrypt Step by Step

Bcrypt Step by Step

9
Comments
5 min read
Authenticating APIs with Cognito

Authenticating APIs with Cognito

4
Comments
2 min read
Randomness, what did you expect ?
Cover image for Randomness, what did you expect ?

Randomness, what did you expect ?

10
Comments 2
8 min read
Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!
Cover image for Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!

Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!

3
Comments 1
3 min read
loading...