Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unlocking Seamless & Secure Access: Introducing Generalized OIDC Authentication in Apache DolphinScheduler

Unlocking Seamless & Secure Access: Introducing Generalized OIDC Authentication in Apache DolphinScheduler

Comments
7 min read
Why You Should Use 310,000+ Iterations with PBKDF2 in 2025

Why You Should Use 310,000+ Iterations with PBKDF2 in 2025

3
Comments
3 min read
The OpenAI Mixpanel Security Incident Explained
Cover image for The OpenAI Mixpanel Security Incident Explained

The OpenAI Mixpanel Security Incident Explained

33
Comments 8
3 min read
I Thought My API Was Secure. I Was Wrong.

I Thought My API Was Secure. I Was Wrong.

Comments
1 min read
What We Learned from Subjecting LikhaERP to Independent VAPT Testing
Cover image for What We Learned from Subjecting LikhaERP to Independent VAPT Testing

What We Learned from Subjecting LikhaERP to Independent VAPT Testing

Comments 1
3 min read
How Modern Operators Use Psychology To Map Targets Before First Contact
Cover image for How Modern Operators Use Psychology To Map Targets Before First Contact

How Modern Operators Use Psychology To Map Targets Before First Contact

7
Comments
7 min read
What Is A DMARC? How It Protects Your Domain From Phishing And Spoofing
Cover image for What Is A DMARC? How It Protects Your Domain From Phishing And Spoofing

What Is A DMARC? How It Protects Your Domain From Phishing And Spoofing

Comments
3 min read
A lightweight secrets scanner that catches exposed keys before they reach GitHub
Cover image for A lightweight secrets scanner that catches exposed keys before they reach GitHub

A lightweight secrets scanner that catches exposed keys before they reach GitHub

4
Comments
2 min read
Cracking the Vault: A Nostalgic Hack at Zero Nights 2017 🚪💻
Cover image for Cracking the Vault: A Nostalgic Hack at Zero Nights 2017 🚪💻

Cracking the Vault: A Nostalgic Hack at Zero Nights 2017 🚪💻

2
Comments
9 min read
Finding Vulnerabilities on EC2 Instances Using AWS Inspector

Finding Vulnerabilities on EC2 Instances Using AWS Inspector

Comments
5 min read
System Design - Authentication

System Design - Authentication

Comments
2 min read
Security Observability in Kubernetes Goes Beyond Logs
Cover image for Security Observability in Kubernetes Goes Beyond Logs

Security Observability in Kubernetes Goes Beyond Logs

Comments
13 min read
Setting Up a Secure Proxy for Web and App Servers

Setting Up a Secure Proxy for Web and App Servers

1
Comments
4 min read
Critical Vulnerability in v380 Cameras: How Plaintext Credentials Exposed Millions of Devices

Critical Vulnerability in v380 Cameras: How Plaintext Credentials Exposed Millions of Devices

5
Comments
18 min read
How to Change a Logged-In User’s Password and Log Out All Active Sessions in Supabase
Cover image for How to Change a Logged-In User’s Password and Log Out All Active Sessions in Supabase

How to Change a Logged-In User’s Password and Log Out All Active Sessions in Supabase

Comments
2 min read
Docker Run İle SSL Sertifikalı Keycloak Kurma

Docker Run İle SSL Sertifikalı Keycloak Kurma

1
Comments
2 min read
The trivialization of server management: the hidden costs and risks

The trivialization of server management: the hidden costs and risks

Comments
7 min read
What I Keep Finding When I Scan Small U.S. Municipal Websites (And How To Fix It In Under An Hour)
Cover image for What I Keep Finding When I Scan Small U.S. Municipal Websites (And How To Fix It In Under An Hour)

What I Keep Finding When I Scan Small U.S. Municipal Websites (And How To Fix It In Under An Hour)

5
Comments 5
6 min read
Keycloak: The Open-Source Hero Behind Secure Logins
Cover image for Keycloak: The Open-Source Hero Behind Secure Logins

Keycloak: The Open-Source Hero Behind Secure Logins

2
Comments
3 min read
How AI Turns API Responses into Ready-Made Test Assertions
Cover image for How AI Turns API Responses into Ready-Made Test Assertions

How AI Turns API Responses into Ready-Made Test Assertions

2
Comments
3 min read
Hello, Dev.to — I'm aash0x 🌙

Hello, Dev.to — I'm aash0x 🌙

Comments
1 min read
How to Choose the Right DDoS Protection Service: Complete 2025 Business Guide

How to Choose the Right DDoS Protection Service: Complete 2025 Business Guide

1
Comments
6 min read
The Practical Playbook for Trustworthy AI Agents in Production

The Practical Playbook for Trustworthy AI Agents in Production

Comments
5 min read
Python Code Quality Tools: Stop Technical Debt Before It Starts
Cover image for Python Code Quality Tools: Stop Technical Debt Before It Starts

Python Code Quality Tools: Stop Technical Debt Before It Starts

Comments
4 min read
Use variable variables of PHP to obfuscate code

Use variable variables of PHP to obfuscate code

1
Comments
2 min read
loading...