Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Cost-Effective Autonomous Threat Containment System on AWS
Cover image for Building a Cost-Effective Autonomous Threat Containment System on AWS

Building a Cost-Effective Autonomous Threat Containment System on AWS

Comments
4 min read
Securing My Stack: Features and Experience Integrating Asgardeo, Ballerina, and Choreo

Securing My Stack: Features and Experience Integrating Asgardeo, Ballerina, and Choreo

Comments
3 min read
Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Comments
2 min read
React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)
Cover image for React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)

React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)

1
Comments
9 min read
Role Based Access Control in SeaORM 2.0
Cover image for Role Based Access Control in SeaORM 2.0

Role Based Access Control in SeaORM 2.0

Comments
9 min read
My First Ethical Open Redirect Scanner: From Zero to Shipped

My First Ethical Open Redirect Scanner: From Zero to Shipped

6
Comments
3 min read
how do you trust a third party API?
Cover image for how do you trust a third party API?

how do you trust a third party API?

Comments 1
2 min read
Empowering Security Teams: How Digital Scheduling Tools Are Revolutionizing Guard Work-Life Balance

Empowering Security Teams: How Digital Scheduling Tools Are Revolutionizing Guard Work-Life Balance

Comments
1 min read
Building SENTINEL: How I Turned Network Packets Into Ghosts

Building SENTINEL: How I Turned Network Packets Into Ghosts

Comments
8 min read
How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare
Cover image for How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

Comments
3 min read
Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Comments
5 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
# Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master
Cover image for # Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master

# Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master

Comments
3 min read
Enriching Vault OIDC Tokens with SPIFFE Identity Metadata using Terraform
Cover image for Enriching Vault OIDC Tokens with SPIFFE Identity Metadata using Terraform

Enriching Vault OIDC Tokens with SPIFFE Identity Metadata using Terraform

Comments
3 min read
Hello World is Hard: Surviving the SGX Setup
Cover image for Hello World is Hard: Surviving the SGX Setup

Hello World is Hard: Surviving the SGX Setup

1
Comments 1
5 min read
Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage
Cover image for Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

1
Comments
2 min read
# Mastering SSH: Why Every Backend Developer Needs This Secure Superpower
Cover image for # Mastering SSH: Why Every Backend Developer Needs This Secure Superpower

# Mastering SSH: Why Every Backend Developer Needs This Secure Superpower

Comments
2 min read
You Thought Frida Was Stealth When Not Attached? Dirty Pages Beg to Differ

You Thought Frida Was Stealth When Not Attached? Dirty Pages Beg to Differ

Comments
2 min read
🛡️ Laravel Secure Baseline: The Guardian Your Pipeline Deserves

🛡️ Laravel Secure Baseline: The Guardian Your Pipeline Deserves

Comments
3 min read
CVE-2025–55182 Explained

CVE-2025–55182 Explained

1
Comments
6 min read
Why the F*ck Is Anyone Still Using FTP⁉️
Cover image for Why the F*ck Is Anyone Still Using FTP⁉️

Why the F*ck Is Anyone Still Using FTP⁉️

2
Comments
3 min read
"If Your Health App Can't Explain Its Encryption, It Doesn't Have Any"
Cover image for "If Your Health App Can't Explain Its Encryption, It Doesn't Have Any"

"If Your Health App Can't Explain Its Encryption, It Doesn't Have Any"

Comments
7 min read
Product Engineering for Fintech Startups: Accelerating Compliance and Growth
Cover image for Product Engineering for Fintech Startups: Accelerating Compliance and Growth

Product Engineering for Fintech Startups: Accelerating Compliance and Growth

Comments
4 min read
Are Shopify Stores Legit? How to Check Store Legitimacy

Are Shopify Stores Legit? How to Check Store Legitimacy

Comments
3 min read
From Detection to Resolution: A Closed-Loop System for Managing AWS CloudFormation Drift
Cover image for From Detection to Resolution: A Closed-Loop System for Managing AWS CloudFormation Drift

From Detection to Resolution: A Closed-Loop System for Managing AWS CloudFormation Drift

Comments
3 min read
loading...