Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Firewall Policies & NAT: Mastering Security and Network Flow

Firewall Policies & NAT: Mastering Security and Network Flow

Comments
3 min read
How to Identify Malicious Content: Key Behavioral Patterns and Dissemination Methods

How to Identify Malicious Content: Key Behavioral Patterns and Dissemination Methods

1
Comments
4 min read
How AI is Reshaping Compliance Monitoring in 2025

How AI is Reshaping Compliance Monitoring in 2025

Comments
2 min read
Protect your Virtual Machine with Fail2ban

Protect your Virtual Machine with Fail2ban

Comments
2 min read
How can Desktop Apps Interact Securely with Web APIs

How can Desktop Apps Interact Securely with Web APIs

5
Comments
2 min read
Understand Web Security: SOP (Same-Origin Policy) and CORS (Cross-Origin Resource Sharing)

Understand Web Security: SOP (Same-Origin Policy) and CORS (Cross-Origin Resource Sharing)

Comments
1 min read
Menggunakan spesial karakter password di WSO2 APIM

Menggunakan spesial karakter password di WSO2 APIM

Comments
1 min read
All you need to know about Code Signing Certificates

All you need to know about Code Signing Certificates

Comments
5 min read
AI 2027 retold from a cloud security perspective

AI 2027 retold from a cloud security perspective

Comments
1 min read
How to Secure APIs Against Broken Authentication Risks

How to Secure APIs Against Broken Authentication Risks

Comments
12 min read
How to Set Up an API Security Framework: A Guide for 2025

How to Set Up an API Security Framework: A Guide for 2025

Comments
10 min read
Unlocking the Power of Vim: A Beginner’s Journey to Efficient, Mindful Editing

Unlocking the Power of Vim: A Beginner’s Journey to Efficient, Mindful Editing

5
Comments
4 min read
Is Your Computer as Safe as Your Home? The Shocking Truth about Linux Security!

Is Your Computer as Safe as Your Home? The Shocking Truth about Linux Security!

Comments
2 min read
Security news weekly round-up - 18th April 2025

Security news weekly round-up - 18th April 2025

1
Comments
5 min read
Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

4
Comments
3 min read
Securing Kubernetes API Server Health Checks Without Anonymous Access

Securing Kubernetes API Server Health Checks Without Anonymous Access

Comments
3 min read
Securing Email with Cisco Email Security Appliance: The Essential Guide

Securing Email with Cisco Email Security Appliance: The Essential Guide

Comments
5 min read
Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help

Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help

Comments
35 min read
🔐 Secure Your Files with chattr +i in Linux

🔐 Secure Your Files with chattr +i in Linux

Comments
1 min read
IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

Comments
3 min read
Getting Started with SAST and Semgrep CLI

Getting Started with SAST and Semgrep CLI

2
Comments
5 min read
How to Protect the SafeLine Management Interface

How to Protect the SafeLine Management Interface

5
Comments
1 min read
Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Comments
7 min read
Workspace Shares Made Easy with Permit IO! LeetCall: Master LeetCode with Spaced Repetition

Workspace Shares Made Easy with Permit IO! LeetCall: Master LeetCode with Spaced Repetition

21
Comments 3
9 min read
Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments
3 min read
loading...