Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Challenge: Upload File Path Traversal
Cover image for Challenge: Upload File Path Traversal

Challenge: Upload File Path Traversal

Comments 2
3 min read
Why Your CI Pipeline Needs Network Security (And How We Built It)
Cover image for Why Your CI Pipeline Needs Network Security (And How We Built It)

Why Your CI Pipeline Needs Network Security (And How We Built It)

Comments
3 min read
Authenticate Connect-MgGraph using OIDC in GitHub Actions
Cover image for Authenticate Connect-MgGraph using OIDC in GitHub Actions

Authenticate Connect-MgGraph using OIDC in GitHub Actions

Comments
1 min read
Secure Shell, Real Power: A Developer’s Guide to SSH
Cover image for Secure Shell, Real Power: A Developer’s Guide to SSH

Secure Shell, Real Power: A Developer’s Guide to SSH

1
Comments 1
8 min read
TIL: How I Set Up My DEV Blog

TIL: How I Set Up My DEV Blog

Comments
1 min read
🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

12
Comments 3
2 min read
Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!
Cover image for Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!

Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!

Comments
2 min read
AWS Certificate Manager Now Offers Exportable Public Certificates
Cover image for AWS Certificate Manager Now Offers Exportable Public Certificates

AWS Certificate Manager Now Offers Exportable Public Certificates

Comments
2 min read
What is HashId? Why Should Developers Use HashId to Secure APIs?
Cover image for What is HashId? Why Should Developers Use HashId to Secure APIs?

What is HashId? Why Should Developers Use HashId to Secure APIs?

Comments
4 min read
Automated Kubernetes Governance with Kyverno and Slack Alerts
Cover image for Automated Kubernetes Governance with Kyverno and Slack Alerts

Automated Kubernetes Governance with Kyverno and Slack Alerts

5
Comments
6 min read
Trump's 'Big Beautiful Bill' May Get a 'Hail Mary' Bitcoin Tax Exemption
Cover image for Trump's 'Big Beautiful Bill' May Get a 'Hail Mary' Bitcoin Tax Exemption

Trump's 'Big Beautiful Bill' May Get a 'Hail Mary' Bitcoin Tax Exemption

4
Comments
1 min read
Under the Hood: Chronos Vault's Triple-Chain Defense System Explained
Cover image for Under the Hood: Chronos Vault's Triple-Chain Defense System Explained

Under the Hood: Chronos Vault's Triple-Chain Defense System Explained

1
Comments 1
5 min read
🧪 Test Automation Meetup – July 2025 Securing APIs and Empowering QA with Human-AI Hybrid
Cover image for 🧪 Test Automation Meetup – July 2025 Securing APIs and Empowering QA with Human-AI Hybrid

🧪 Test Automation Meetup – July 2025 Securing APIs and Empowering QA with Human-AI Hybrid

Comments
1 min read
Why Your NodeJs/NestJS JWT Authentication is Probably Broken

Why Your NodeJs/NestJS JWT Authentication is Probably Broken

2
Comments 3
9 min read
How to Install Wiz with Sveltos: A Smarter Way to Automate Multi-Cluster Security on AKS
Cover image for How to Install Wiz with Sveltos: A Smarter Way to Automate Multi-Cluster Security on AKS

How to Install Wiz with Sveltos: A Smarter Way to Automate Multi-Cluster Security on AKS

Comments
3 min read
Fake Job Offers Are Turning GitHub Repos Into a Trap
Cover image for Fake Job Offers Are Turning GitHub Repos Into a Trap

Fake Job Offers Are Turning GitHub Repos Into a Trap

3
Comments
5 min read
Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography

Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography

3
Comments
7 min read
🛡️ OWASP Top 10 (2021 Edition) — Explained
Cover image for 🛡️ OWASP Top 10 (2021 Edition) — Explained

🛡️ OWASP Top 10 (2021 Edition) — Explained

3
Comments
1 min read
Revolutionizing DevSecOps: How AI is Reshaping Software Security

Revolutionizing DevSecOps: How AI is Reshaping Software Security

1
Comments
6 min read
Why HTTPS Is Just HTTP with a Cool Hoodie and Bodyguards.
Cover image for Why HTTPS Is Just HTTP with a Cool Hoodie and Bodyguards.

Why HTTPS Is Just HTTP with a Cool Hoodie and Bodyguards.

1
Comments
4 min read
2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

10
Comments
7 min read
2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

10
Comments
5 min read
Setting up an airgapped LLM using Ollama

Setting up an airgapped LLM using Ollama

2
Comments
4 min read
⏱️ Time Tracking for Teachers in Oldenburg – A Long-Overdue Step Toward Relieving Educators
Cover image for ⏱️ Time Tracking for Teachers in Oldenburg – A Long-Overdue Step Toward Relieving Educators

⏱️ Time Tracking for Teachers in Oldenburg – A Long-Overdue Step Toward Relieving Educators

13
Comments
3 min read
Container security at scale: Building untrusted images safely
Cover image for Container security at scale: Building untrusted images safely

Container security at scale: Building untrusted images safely

Comments 1
6 min read
loading...