Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Criando um malware em Rust 🦀
Cover image for Criando um malware em Rust 🦀

Criando um malware em Rust 🦀

2
Comments
10 min read
📰 Major Tech News: September 29, 2025
Cover image for 📰 Major Tech News: September 29, 2025

📰 Major Tech News: September 29, 2025

27
Comments 2
4 min read
Module 3 — Derived Digital Identities and Interoperability
Cover image for Module 3 — Derived Digital Identities and Interoperability

Module 3 — Derived Digital Identities and Interoperability

Comments
4 min read
Cloud Misconfigurations: The Hidden Door Hackers Love
Cover image for Cloud Misconfigurations: The Hidden Door Hackers Love

Cloud Misconfigurations: The Hidden Door Hackers Love

Comments
3 min read
ADS — Alternate Data Streams (Beginner friendly PoC)

ADS — Alternate Data Streams (Beginner friendly PoC)

3
Comments 1
4 min read
3 Gotchas When Calling an IAP‑Protected Cloud Run API from a Chrome Extension (MV3)

3 Gotchas When Calling an IAP‑Protected Cloud Run API from a Chrome Extension (MV3)

7
Comments 2
3 min read
Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

7
Comments
2 min read
Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)
Cover image for Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)

Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)

Comments
2 min read
What Blockchain Actually Brings to Cyber Defense (And What It Doesn’t)

What Blockchain Actually Brings to Cyber Defense (And What It Doesn’t)

3
Comments 2
4 min read
Mastering Web Fundamentals: Top Interview Questions and Answers (HTTP, TLS, Security, Performance)

Mastering Web Fundamentals: Top Interview Questions and Answers (HTTP, TLS, Security, Performance)

Comments
4 min read
Stronger iPhone Security for Crypto Transactions
Cover image for Stronger iPhone Security for Crypto Transactions

Stronger iPhone Security for Crypto Transactions

6
Comments
1 min read
IAM POLICIES
Cover image for IAM POLICIES

IAM POLICIES

1
Comments
3 min read
🔐 End-to-End File Encryption with AES and Integrity Checks
Cover image for 🔐 End-to-End File Encryption with AES and Integrity Checks

🔐 End-to-End File Encryption with AES and Integrity Checks

Comments
5 min read
The Dangers of JWT Decoding on the Frontend: What You Need to Know

The Dangers of JWT Decoding on the Frontend: What You Need to Know

Comments
1 min read
Post-Cookie Web: Building Privacy-First Analytics That Actually Work
Cover image for Post-Cookie Web: Building Privacy-First Analytics That Actually Work

Post-Cookie Web: Building Privacy-First Analytics That Actually Work

17
Comments
4 min read
🛡 CrowdSec: Open‑Source, Crowd‑Powered Defense

🛡 CrowdSec: Open‑Source, Crowd‑Powered Defense

2
Comments
1 min read
SOC 2 for Engineers: What It Is and Why Your Terrible Tagging Strategy Is an Audit Failure Waiting to Happen

SOC 2 for Engineers: What It Is and Why Your Terrible Tagging Strategy Is an Audit Failure Waiting to Happen

Comments
5 min read
How to Discover and Protect Sensitive Data Using CLI and SQL Tools
Cover image for How to Discover and Protect Sensitive Data Using CLI and SQL Tools

How to Discover and Protect Sensitive Data Using CLI and SQL Tools

Comments
2 min read
Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad
Cover image for Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Comments
4 min read
Android Kiosk Mode Explained in Simple Steps
Cover image for Android Kiosk Mode Explained in Simple Steps

Android Kiosk Mode Explained in Simple Steps

Comments
5 min read
📰 Major Tech News: September 28, 2025
Cover image for 📰 Major Tech News: September 28, 2025

📰 Major Tech News: September 28, 2025

20
Comments 2
5 min read
Outil de Cybersécurité du Jour - Aug 28, 2025

Outil de Cybersécurité du Jour - Aug 28, 2025

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 20, 2025

Outil de Cybersécurité du Jour - Sep 20, 2025

1
Comments
3 min read
Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security
Cover image for Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security

Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security

1
Comments
9 min read
Fintech Security: Best Practices for Fintech Apps
Cover image for Fintech Security: Best Practices for Fintech Apps

Fintech Security: Best Practices for Fintech Apps

20
Comments
8 min read
loading...