Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 1/2)
Cover image for How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 1/2)

How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 1/2)

17
Comments 2
6 min read
Detect Dos, ping etc.. using SNORT

Detect Dos, ping etc.. using SNORT

11
Comments
1 min read
The ultra secure chat

The ultra secure chat

6
Comments
4 min read
How to secure your Gatsby app with security headers

How to secure your Gatsby app with security headers

7
Comments
3 min read
Billion Laughs Attack examples

Billion Laughs Attack examples

6
Comments
3 min read
CSRF and Cross-Origin Requests by Example
Cover image for CSRF and Cross-Origin Requests by Example

CSRF and Cross-Origin Requests by Example

71
Comments
9 min read
Introduction to Hashing
Cover image for Introduction to Hashing

Introduction to Hashing

26
Comments 7
3 min read
GCP Cloud SQL Secure connection

GCP Cloud SQL Secure connection

9
Comments
6 min read
Pass: the simple CLI password manager

Pass: the simple CLI password manager

3
Comments 2
2 min read
Secure your Elasticsearch Cluster
Cover image for Secure your Elasticsearch Cluster

Secure your Elasticsearch Cluster

5
Comments
2 min read
How to password-protect your website with Cloudflare Workers

How to password-protect your website with Cloudflare Workers

6
Comments
4 min read
How to make the internet a safer place as a developer
Cover image for How to make the internet a safer place as a developer

How to make the internet a safer place as a developer

18
Comments 3
5 min read
Using Google Tag Manager with a Content-Security-Policy
Cover image for Using Google Tag Manager with a Content-Security-Policy

Using Google Tag Manager with a Content-Security-Policy

30
Comments 7
3 min read
Illustrated Notes on Web Security Essentials
Cover image for Illustrated Notes on Web Security Essentials

Illustrated Notes on Web Security Essentials

20
Comments 1
2 min read
Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)
Cover image for Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

10
Comments
3 min read
Easy understanding of web protocols - HTTP and HTTPS
Cover image for Easy understanding of web protocols - HTTP and HTTPS

Easy understanding of web protocols - HTTP and HTTPS

51
Comments
6 min read
Adding OAuth2 support to your Meetup API Custom Connector for Azure Logic Apps

Adding OAuth2 support to your Meetup API Custom Connector for Azure Logic Apps

3
Comments
3 min read
AWS re:Invent Session: Building a Continuous Vulnerability Remediation Habit

AWS re:Invent Session: Building a Continuous Vulnerability Remediation Habit

2
Comments
1 min read
Adding Authorization to a Serverless Node.js App
Cover image for Adding Authorization to a Serverless Node.js App

Adding Authorization to a Serverless Node.js App

7
Comments
7 min read
The 6 Aspects You Must Secure On Your MongoDB Instances
Cover image for The 6 Aspects You Must Secure On Your MongoDB Instances

The 6 Aspects You Must Secure On Your MongoDB Instances

13
Comments
8 min read
What's an API Gateway and How Do You Choose the Right One
Cover image for What's an API Gateway and How Do You Choose the Right One

What's an API Gateway and How Do You Choose the Right One

20
Comments 2
8 min read
Learn from Data Breach
Cover image for Learn from Data Breach

Learn from Data Breach

3
Comments 1
2 min read
The $81 million Bangladesh bank heist that was assisted with improper software security practices in place
Cover image for The $81 million Bangladesh bank heist that was assisted with improper software security practices in place

The $81 million Bangladesh bank heist that was assisted with improper software security practices in place

3
Comments 1
8 min read
My perfect AWS and Kubernetes role-based access control and the reality
Cover image for My perfect AWS and Kubernetes role-based access control and the reality

My perfect AWS and Kubernetes role-based access control and the reality

7
Comments
10 min read
localStorage vs cookies: the "tabs vs spaces" sterile debate of web development 🙄
Cover image for localStorage vs cookies: the "tabs vs spaces" sterile debate of web development 🙄

localStorage vs cookies: the "tabs vs spaces" sterile debate of web development 🙄

60
Comments 19
3 min read
loading...