Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Beyond "The End of Cybersecurity": Refusal as Default Architecture
Cover image for Beyond "The End of Cybersecurity": Refusal as Default Architecture

Beyond "The End of Cybersecurity": Refusal as Default Architecture

2
Comments 3
12 min read
How I Cleaned a Hacked WordPress Database in 5 Minutes

How I Cleaned a Hacked WordPress Database in 5 Minutes

Comments 1
5 min read
🧩 How We Solved “Unable to Get Certificate CRL” in Rails: A Debugging Story
Cover image for 🧩 How We Solved “Unable to Get Certificate CRL” in Rails: A Debugging Story

🧩 How We Solved “Unable to Get Certificate CRL” in Rails: A Debugging Story

4
Comments 1
4 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security
Cover image for Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.
Cover image for Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.

Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.

Comments
6 min read
The $440,000 Architecture Mistake: Why Deloitte's AI Failed (And How to Prevent It)

The $440,000 Architecture Mistake: Why Deloitte's AI Failed (And How to Prevent It)

3
Comments
6 min read
Reverse Methods for Obtaining Phone Numbers and Preventive Measures

Reverse Methods for Obtaining Phone Numbers and Preventive Measures

2
Comments
3 min read
What I Learned Building Three Simple Projects: AnimalSounds, CheeseMath, and a Node.js Secrets Tutorial
Cover image for What I Learned Building Three Simple Projects: AnimalSounds, CheeseMath, and a Node.js Secrets Tutorial

What I Learned Building Three Simple Projects: AnimalSounds, CheeseMath, and a Node.js Secrets Tutorial

Comments
2 min read
Congrats to the Winners of the Auth0 for AI Agents Challenge!
Cover image for Congrats to the Winners of the Auth0 for AI Agents Challenge!

Congrats to the Winners of the Auth0 for AI Agents Challenge!

46
Comments 20
2 min read
Unified Authentication and Key Distribution Scheme for Apps Without Human-Device Interaction

Unified Authentication and Key Distribution Scheme for Apps Without Human-Device Interaction

Comments
7 min read
Meaning of passwordless authentication for beginners (and let's make it)
Cover image for Meaning of passwordless authentication for beginners (and let's make it)

Meaning of passwordless authentication for beginners (and let's make it)

2
Comments
3 min read
Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance
Cover image for Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Comments
2 min read
Securing AWS Credentials with Secrets Manager after Sanitizing Git History
Cover image for Securing AWS Credentials with Secrets Manager after Sanitizing Git History

Securing AWS Credentials with Secrets Manager after Sanitizing Git History

Comments
6 min read
Secrets in .NET: Why Strings Are Not Safe (and What to Do Instead)

Secrets in .NET: Why Strings Are Not Safe (and What to Do Instead)

3
Comments 1
8 min read
Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

1
Comments
5 min read
Build a Smart Object Detection Alarm with Arduino & HC-SR04 Sensor – Full Tutorial

Build a Smart Object Detection Alarm with Arduino & HC-SR04 Sensor – Full Tutorial

Comments
2 min read
Gadget chains in Java: how unsafe deserialization leads to RCE?

Gadget chains in Java: how unsafe deserialization leads to RCE?

Comments
11 min read
Top Security Threats in Blockchain
Cover image for Top Security Threats in Blockchain

Top Security Threats in Blockchain

1
Comments
6 min read
Docker Registry (Harbor) and Private Repositories

Docker Registry (Harbor) and Private Repositories

1
Comments
5 min read
Demystifying OAuth2 APIs: A Comprehensive Guide

Demystifying OAuth2 APIs: A Comprehensive Guide

Comments
1 min read
OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

2
Comments
2 min read
HTML Decode vs HTML Encode – Complete Guide
Cover image for HTML Decode vs HTML Encode – Complete Guide

HTML Decode vs HTML Encode – Complete Guide

Comments
2 min read
From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

Comments
3 min read
🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

Comments
1 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
loading...