Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance
Cover image for Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance

Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance

1
Comments
16 min read
🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity
Cover image for 🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity

🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity

Comments
4 min read
MVP Conf 2025 - OWASP API Security Top 10

MVP Conf 2025 - OWASP API Security Top 10

Comments
3 min read
I Was Given a “Job Assignment” That Installed Malware
Cover image for I Was Given a “Job Assignment” That Installed Malware

I Was Given a “Job Assignment” That Installed Malware

3
Comments
2 min read
WHAT IS A SECRET?

WHAT IS A SECRET?

6
Comments
6 min read
JWT Token Validator Challenge
Cover image for JWT Token Validator Challenge

JWT Token Validator Challenge

2
Comments
8 min read
Security-First WebSockets: Protecting Real-Time Communications
Cover image for Security-First WebSockets: Protecting Real-Time Communications

Security-First WebSockets: Protecting Real-Time Communications

3
Comments 2
2 min read
eBPF Tutorial: Privilege Escalation via File Content Manipulation

eBPF Tutorial: Privilege Escalation via File Content Manipulation

Comments
7 min read
How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats
Cover image for How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

Comments
5 min read
Create Microsoft OAuth2 API

Create Microsoft OAuth2 API

Comments
1 min read
ABAC with Open Policy Agent (OPA)

ABAC with Open Policy Agent (OPA)

Comments
9 min read
How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)
Cover image for How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)

How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)

1
Comments
4 min read
Understanding SSH: A Beginner's Guide
Cover image for Understanding SSH: A Beginner's Guide

Understanding SSH: A Beginner's Guide

3
Comments
8 min read
Trust-First Growth for Crypto Tech: A Developer’s Playbook

Trust-First Growth for Crypto Tech: A Developer’s Playbook

Comments
5 min read
Let's Stop Overprotecting Confidential Information

Let's Stop Overprotecting Confidential Information

Comments
3 min read
Data Protection in Blockchain | CCPA Compliance
Cover image for Data Protection in Blockchain | CCPA Compliance

Data Protection in Blockchain | CCPA Compliance

3
Comments
3 min read
The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security
Cover image for The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

Comments
9 min read
Modelo de Responsabilidade Compartilhada do IAM: Quem faz o quê na AWS?
Cover image for Modelo de Responsabilidade Compartilhada do IAM: Quem faz o quê na AWS?

Modelo de Responsabilidade Compartilhada do IAM: Quem faz o quê na AWS?

Comments
3 min read
Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)
Cover image for Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)

Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)

6
Comments
2 min read
GreHack 2025
Cover image for GreHack 2025

GreHack 2025

Comments
3 min read
Your audit logs are about to break your database

Your audit logs are about to break your database

Comments
2 min read
Making AI sound like a human should be illegal

Making AI sound like a human should be illegal

Comments
1 min read
Proper Key Derivation and Cryptographic Session Setup: Best Practices for Secure Communication

Proper Key Derivation and Cryptographic Session Setup: Best Practices for Secure Communication

Comments
2 min read
Modelo de Responsabilidade Compartilhada da AWS
Cover image for Modelo de Responsabilidade Compartilhada da AWS

Modelo de Responsabilidade Compartilhada da AWS

Comments
3 min read
loading...