Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
BetterAuth Integration with Encore.ts

BetterAuth Integration with Encore.ts

8
Comments
14 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Cover image for Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Comments
4 min read
Setup GitHub SSH Access on a Machine

Setup GitHub SSH Access on a Machine

Comments
1 min read
Top 5 Open-Source Anti-Bot Tools in 2025

Top 5 Open-Source Anti-Bot Tools in 2025

5
Comments
3 min read
debug cr

debug cr

Comments
1 min read
EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)
Cover image for EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

2
Comments
7 min read
Industries Where Your C Code Saves Lives (And They're Hiring)
Cover image for Industries Where Your C Code Saves Lives (And They're Hiring)

Industries Where Your C Code Saves Lives (And They're Hiring)

Comments 6
8 min read
Cryptography: The Hidden Engine Powering Web3
Cover image for Cryptography: The Hidden Engine Powering Web3

Cryptography: The Hidden Engine Powering Web3

Comments
2 min read
Take Control: The Best Cloud Storage Alternatives to Own Your Files
Cover image for Take Control: The Best Cloud Storage Alternatives to Own Your Files

Take Control: The Best Cloud Storage Alternatives to Own Your Files

Comments
4 min read
Beyond Code: The Obsessive Knowledge That Makes You Dangerous
Cover image for Beyond Code: The Obsessive Knowledge That Makes You Dangerous

Beyond Code: The Obsessive Knowledge That Makes You Dangerous

1
Comments
9 min read
Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan

Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan

Comments 1
2 min read
AWS IAM Outbound OIDC with Google Cloud Identity Pool
Cover image for AWS IAM Outbound OIDC with Google Cloud Identity Pool

AWS IAM Outbound OIDC with Google Cloud Identity Pool

1
Comments
10 min read
A importância de gerenciar corretamente variáveis de ambiente (.env)

A importância de gerenciar corretamente variáveis de ambiente (.env)

Comments
3 min read
Application Security with AI SAST: How AI SAST is making the Future Proactive

Application Security with AI SAST: How AI SAST is making the Future Proactive

5
Comments
3 min read
The Architecture of Browser Sandboxes: A Deep Dive into JavaScript Code Isolation
Cover image for The Architecture of Browser Sandboxes: A Deep Dive into JavaScript Code Isolation

The Architecture of Browser Sandboxes: A Deep Dive into JavaScript Code Isolation

6
Comments 2
51 min read
🛑 CI/CD Security Mistake: Are You Giving Your Build Container Root Access to Your Server?

🛑 CI/CD Security Mistake: Are You Giving Your Build Container Root Access to Your Server?

4
Comments
3 min read
Safe and Secure Software - MISRA C:2012

Safe and Secure Software - MISRA C:2012

Comments 1
12 min read
SREday SF 2025: Human Centered SRE In An AI World
Cover image for SREday SF 2025: Human Centered SRE In An AI World

SREday SF 2025: Human Centered SRE In An AI World

Comments
7 min read
Authentication vs Authorization (Explained in the Simplest Way Possible)

Authentication vs Authorization (Explained in the Simplest Way Possible)

4
Comments 2
2 min read
Building Real Privacy: Secure Data Transmission Without Servers

Building Real Privacy: Secure Data Transmission Without Servers

Comments
2 min read
AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

4
Comments
2 min read
requestPermissionsFromUser() does not work or directly returns without asking the user.

requestPermissionsFromUser() does not work or directly returns without asking the user.

1
Comments
1 min read
5 Security Vulnerabilities Every Developer Must Fix Today
Cover image for 5 Security Vulnerabilities Every Developer Must Fix Today

5 Security Vulnerabilities Every Developer Must Fix Today

Comments
3 min read
🔒 Protect Sensitive Data in Uniface 10.4 with Pathscrambler

🔒 Protect Sensitive Data in Uniface 10.4 with Pathscrambler

Comments
2 min read
From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM
Cover image for From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

Comments 1
5 min read
loading...