Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🧩 JSFuck — JavaScript Using Only 6 Characters
Cover image for 🧩 JSFuck — JavaScript Using Only 6 Characters

🧩 JSFuck — JavaScript Using Only 6 Characters

Comments
2 min read
Upwork verification call. What questions to expect?

Upwork verification call. What questions to expect?

Comments
2 min read
OWASP Top 10 2025 Quiz: Week 1 (51 Questions)

OWASP Top 10 2025 Quiz: Week 1 (51 Questions)

Comments
25 min read
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
Cover image for Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime

Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime

Comments
14 min read
File Chunking: Why It Matters for Cybersecurity in Modern Applications

File Chunking: Why It Matters for Cybersecurity in Modern Applications

Comments
2 min read
Top IDEs and Editors Used 👨🏻‍💻📝💡
Cover image for Top IDEs and Editors Used 👨🏻‍💻📝💡

Top IDEs and Editors Used 👨🏻‍💻📝💡

5
Comments
1 min read
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
Cover image for From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

Comments
12 min read
Automate Dynamic Application Security Testing (DAST) with CI/CD
Cover image for Automate Dynamic Application Security Testing (DAST) with CI/CD

Automate Dynamic Application Security Testing (DAST) with CI/CD

Comments
2 min read
Building a Strike System: How I Prevent AI Feature Abuse in My News App
Cover image for Building a Strike System: How I Prevent AI Feature Abuse in My News App

Building a Strike System: How I Prevent AI Feature Abuse in My News App

Comments
4 min read
File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes
Cover image for File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

Comments
7 min read
Agentic AI Security: Why Autonomous Systems Require a New Security Framework
Cover image for Agentic AI Security: Why Autonomous Systems Require a New Security Framework

Agentic AI Security: Why Autonomous Systems Require a New Security Framework

38
Comments 12
5 min read
Keeping Your Health Data Out of Court
Cover image for Keeping Your Health Data Out of Court

Keeping Your Health Data Out of Court

Comments
4 min read
Kubernetes validating admission policy and admission binding
Cover image for Kubernetes validating admission policy and admission binding

Kubernetes validating admission policy and admission binding

1
Comments
3 min read
FeetFinder & Background Checks: How Deep Do Employment Checks Go?

FeetFinder & Background Checks: How Deep Do Employment Checks Go?

Comments
4 min read
Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations
Cover image for Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

8
Comments 2
5 min read
Catch vulnerabilities before they ship: local SonarQube setup (Part 2)
Cover image for Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

1
Comments
8 min read
Building a Production-Ready A2A Protocol Agent: A Technical Journey

Building a Production-Ready A2A Protocol Agent: A Technical Journey

1
Comments
4 min read
Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks
Cover image for Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks

Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks

2
Comments
6 min read
😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫
Cover image for 😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

12
Comments 2
3 min read
How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

Comments
5 min read
Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Comments
4 min read
Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It
Cover image for Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Comments
3 min read
From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days
Cover image for From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

15
Comments 2
4 min read
YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security
Cover image for YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

4
Comments
6 min read
10 Common Supabase Security Misconfigurations (and How to Fix Them)
Cover image for 10 Common Supabase Security Misconfigurations (and How to Fix Them)

10 Common Supabase Security Misconfigurations (and How to Fix Them)

1
Comments
6 min read
loading...