Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

Comments
3 min read
🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

Comments
1 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web
Cover image for Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Comments
3 min read
What is a Prompt Injection Attack

What is a Prompt Injection Attack

1
Comments
2 min read
Building a Secure Local Video Player in Electron
Cover image for Building a Secure Local Video Player in Electron

Building a Secure Local Video Player in Electron

Comments
5 min read
OWASP Cornucopia 3.0 - A call for card game designers!
Cover image for OWASP Cornucopia 3.0 - A call for card game designers!

OWASP Cornucopia 3.0 - A call for card game designers!

1
Comments
2 min read
The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance
Cover image for The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

Comments
4 min read
Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

1
Comments
6 min read
Stop Storing Secrets in localStorage: Patterns for a Secure Digital ID Wallet

Stop Storing Secrets in localStorage: Patterns for a Secure Digital ID Wallet

2
Comments 1
6 min read
Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Comments
7 min read
The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

Comments
5 min read
Testing HMAC Signatures Online — A Free Developer Tool

Testing HMAC Signatures Online — A Free Developer Tool

Comments
2 min read
Proof-Carrying Plans: Guaranteeing AI Action by Arvind Sundararajan

Proof-Carrying Plans: Guaranteeing AI Action by Arvind Sundararajan

Comments
2 min read
Error after Angular version 18 upgrade: Content Security Policy Violation

Error after Angular version 18 upgrade: Content Security Policy Violation

Comments
1 min read
WRITE-UP N1CTF 2025

WRITE-UP N1CTF 2025

Comments
6 min read
Project: Cloud Guardrails with OPA + Conftest + Config/SecurityHub + Auto-Remediation

Project: Cloud Guardrails with OPA + Conftest + Config/SecurityHub + Auto-Remediation

2
Comments
9 min read
From API Keys to E2EE: A Practical Guide to Securing Your Real-Time App
Cover image for From API Keys to E2EE: A Practical Guide to Securing Your Real-Time App

From API Keys to E2EE: A Practical Guide to Securing Your Real-Time App

6
Comments
5 min read
Servicios de AWS que un Cloud Security Engineer debe dominar, aunque NO sean "servicios de seguridad" per se

Servicios de AWS que un Cloud Security Engineer debe dominar, aunque NO sean "servicios de seguridad" per se

Comments
3 min read
A Better Password Authentication Flow.. hear me out
Cover image for A Better Password Authentication Flow.. hear me out

A Better Password Authentication Flow.. hear me out

5
Comments
8 min read
Role-Based Authorization for Rails: How We Built Rabarber

Role-Based Authorization for Rails: How We Built Rabarber

6
Comments 4
4 min read
Configuring TLS in the Mosquitto MQTT broker
Cover image for Configuring TLS in the Mosquitto MQTT broker

Configuring TLS in the Mosquitto MQTT broker

Comments
4 min read
Secure Your AWS Account: Automate IAM Expiry Notifications with Lambda + SNS

Secure Your AWS Account: Automate IAM Expiry Notifications with Lambda + SNS

Comments
6 min read
Security for Bootstrapped Startups: The $0 Budget Checklist (2025)
Cover image for Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

1
Comments 2
10 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
loading...