Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AWS Penetration Testing Insights
Cover image for AWS Penetration Testing Insights

AWS Penetration Testing Insights

11
Comments 2
3 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
Código seguro com OWASP e SSDLC - 1 Top Ten

Código seguro com OWASP e SSDLC - 1 Top Ten

3
Comments
3 min read
Understanding the MD5 Function

Understanding the MD5 Function

Comments
2 min read
Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force
Cover image for Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force

Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force

4
Comments 1
5 min read
Using AWS Network Access Analyzer to Explore your Network
Cover image for Using AWS Network Access Analyzer to Explore your Network

Using AWS Network Access Analyzer to Explore your Network

Comments
2 min read
How to Impersonate a Service Account Using Bigquery Client Library
Cover image for How to Impersonate a Service Account Using Bigquery Client Library

How to Impersonate a Service Account Using Bigquery Client Library

1
Comments
2 min read
It doesn't take an APT to hack devs via a packaging ecosystem

It doesn't take an APT to hack devs via a packaging ecosystem

2
Comments 1
4 min read
AWS CDK: Principle of Least Privilege

AWS CDK: Principle of Least Privilege

9
Comments
3 min read
We've always done it this way
Cover image for We've always done it this way

We've always done it this way

Comments
3 min read
Configure Image Automation with Flux
Cover image for Configure Image Automation with Flux

Configure Image Automation with Flux

9
Comments
4 min read
Should we use VPN on browsing?
Cover image for Should we use VPN on browsing?

Should we use VPN on browsing?

Comments
4 min read
The cost of false positives in software security, Part 1: Small applications
Cover image for The cost of false positives in software security, Part 1: Small applications

The cost of false positives in software security, Part 1: Small applications

5
Comments
6 min read
Automating Kubernetes Deployments with Flux
Cover image for Automating Kubernetes Deployments with Flux

Automating Kubernetes Deployments with Flux

15
Comments
5 min read
How to Secure Vercel Cron Job routes in NextJS 13

How to Secure Vercel Cron Job routes in NextJS 13

2
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.