Forem

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
๐“๐ก๐ž ๐๐ฌ๐ฒ๐œ๐ก๐จ๐ฅ๐จ๐ ๐ฒ ๐จ๐Ÿ ๐’๐จ๐œ๐ข๐š๐ฅ ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐ : ๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐š๐ง๐ ๐˜๐จ๐ฎ๐ซ ๐ƒ๐š๐ญ๐š

๐“๐ก๐ž ๐๐ฌ๐ฒ๐œ๐ก๐จ๐ฅ๐จ๐ ๐ฒ ๐จ๐Ÿ ๐’๐จ๐œ๐ข๐š๐ฅ ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐ : ๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐š๐ง๐ ๐˜๐จ๐ฎ๐ซ ๐ƒ๐š๐ญ๐š

5
Comments 7
1 min read
Safe and Secure Consumption of Open Source Libraries
Cover image for Safe and Secure Consumption of Open Source Libraries

Safe and Secure Consumption of Open Source Libraries

2
Comments
3 min read
What Technologies Help Prevent Cyber Attacks? ๐Ÿ›ก๏ธ๐Ÿ’ป

What Technologies Help Prevent Cyber Attacks? ๐Ÿ›ก๏ธ๐Ÿ’ป

2
Comments
1 min read
๐‚๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐š ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ: ๐ค๐ž๐ฒ ๐ฌ๐ญ๐š๐ ๐ž๐ฌ ๐š๐ง๐ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

๐‚๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐š ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ: ๐ค๐ž๐ฒ ๐ฌ๐ญ๐š๐ ๐ž๐ฌ ๐š๐ง๐ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

1
Comments
1 min read
How to Apply a Magento 2 Patch
Cover image for How to Apply a Magento 2 Patch

How to Apply a Magento 2 Patch

5
Comments 2
2 min read
JWT for Developers: Behind the Scenes.
Cover image for JWT for Developers: Behind the Scenes.

JWT for Developers: Behind the Scenes.

4
Comments 1
4 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown
Cover image for SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Patch your servers! It's time of regreSSHion
Cover image for Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
How to Design Secure and Safe APIs: 12 Essential Tips for API Security
Cover image for How to Design Secure and Safe APIs: 12 Essential Tips for API Security

How to Design Secure and Safe APIs: 12 Essential Tips for API Security

2
Comments
3 min read
Level up your Git security: Verified commits with Kleopatra!
Cover image for Level up your Git security: Verified commits with Kleopatra!

Level up your Git security: Verified commits with Kleopatra!

6
Comments
1 min read
๐Ÿ›ก๏ธ Key cybersecurity threats in 2024: What should businesses know?

๐Ÿ›ก๏ธ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
Como um Malware opera, quais sรฃo os seus tipos e como se proteger.
Cover image for Como um Malware opera, quais sรฃo os seus tipos e como se proteger.

Como um Malware opera, quais sรฃo os seus tipos e como se proteger.

3
Comments
5 min read
Gone in 120 seconds

Gone in 120 seconds

1
Comments
5 min read
How to Implement Two-Factor Authentication (2FA) in Golang
Cover image for How to Implement Two-Factor Authentication (2FA) in Golang

How to Implement Two-Factor Authentication (2FA) in Golang

17
Comments
16 min read
Quarterly Rewards for security researchers๏ผ
Cover image for Quarterly Rewards for security researchers๏ผ

Quarterly Rewards for security researchers๏ผ

1
Comments
1 min read
๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.