Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cloudflare and AWS Autoscaling Group for DDoS attack mitigation
Cover image for Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

12
Comments
4 min read
An analysis of logic flaws in web-of-trust services
Cover image for An analysis of logic flaws in web-of-trust services

An analysis of logic flaws in web-of-trust services

16
Comments
5 min read
Protect your Node.js app from Cross-Site Request Forgery
Cover image for Protect your Node.js app from Cross-Site Request Forgery

Protect your Node.js app from Cross-Site Request Forgery

160
Comments
6 min read
Broken Link Hijacking - How expired links can be exploited.
Cover image for Broken Link Hijacking - How expired links can be exploited.

Broken Link Hijacking - How expired links can be exploited.

12
Comments
3 min read
A House of Cards: An Exploration of Security When Building Docker Containers

A House of Cards: An Exploration of Security When Building Docker Containers

31
Comments 2
10 min read
A lightweight reconnaissance setup for bug bounty hunters
Cover image for A lightweight reconnaissance setup for bug bounty hunters

A lightweight reconnaissance setup for bug bounty hunters

13
Comments
2 min read
Find security issues before the code goes into production

Find security issues before the code goes into production

20
Comments 1
7 min read
Beyond the login screen - Part II
Cover image for Beyond the login screen - Part II

Beyond the login screen - Part II

14
Comments
5 min read
Visualize AWS Flow Logs in a Visual Environment (closed beta)

Visualize AWS Flow Logs in a Visual Environment (closed beta)

7
Comments
1 min read
Beyond the login screen - Part I
Cover image for Beyond the login screen - Part I

Beyond the login screen - Part I

17
Comments 2
2 min read
Homographs, Attack!

Homographs, Attack!

318
Comments 30
10 min read
Using HTTP Headers to Secure Your Site

Using HTTP Headers to Secure Your Site

225
Comments
9 min read
Four Security Principles That Software Developers Should Follow
Cover image for Four Security Principles That Software Developers Should Follow

Four Security Principles That Software Developers Should Follow

211
Comments 21
8 min read
Airline websites don’t care about your privacy follow-up: Emirates responds to my article with…

Airline websites don’t care about your privacy follow-up: Emirates responds to my article with…

13
Comments 2
5 min read
Please Stop Using Local Storage

Please Stop Using Local Storage

1133
Comments 203
11 min read
Security Sprint: What I learnt in a CTF

Security Sprint: What I learnt in a CTF

56
Comments 5
2 min read
Adding Free SSL Certificates To Static Websites via AWS Certificate Manager
Cover image for Adding Free SSL Certificates To Static Websites via AWS Certificate Manager

Adding Free SSL Certificates To Static Websites via AWS Certificate Manager

29
Comments
4 min read
Linux Syslog Server And Log Management

Linux Syslog Server And Log Management

13
Comments
1 min read
[PoC] Password-Based user roles and triggers/actions

[PoC] Password-Based user roles and triggers/actions

9
Comments
4 min read
I learned enough Web Crypto to be dangerous

I learned enough Web Crypto to be dangerous

17
Comments 6
4 min read
Adding HTTPS To GitHub Pages Using A Custom Domain
Cover image for Adding HTTPS To GitHub Pages Using A Custom Domain

Adding HTTPS To GitHub Pages Using A Custom Domain

18
Comments 3
4 min read
How screwed would your employer be if you died suddenly?
Cover image for How screwed would your employer be if you died suddenly?

How screwed would your employer be if you died suddenly?

22
Comments 16
5 min read
Add security.txt to your website

Add security.txt to your website

12
Comments
2 min read
Dark patterns with the HTML 5.2 <dialog> tag and Chrome for fun and profit

Dark patterns with the HTML 5.2 <dialog> tag and Chrome for fun and profit

13
Comments 1
1 min read
This is how Meltdown works

This is how Meltdown works

215
Comments 26
5 min read
loading...