Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

6
Comments
3 min read
Understanding MCP and Its Security Implications

Understanding MCP and Its Security Implications

Comments
4 min read
Building a Secret Scanner in Julia: A GitLeaks Alternative

Building a Secret Scanner in Julia: A GitLeaks Alternative

Comments
4 min read
Secure Admin Setup Without a Database (for Now!)

Secure Admin Setup Without a Database (for Now!)

Comments
3 min read
How to Secure AWS Infrastructure

How to Secure AWS Infrastructure

Comments
5 min read
Your Plaintext Email is a DevSecOps Blind Spot

Your Plaintext Email is a DevSecOps Blind Spot

Comments
5 min read
Drosera HandBook: The ABC of Traps

Drosera HandBook: The ABC of Traps

5
Comments
13 min read
(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
Top 5 Intel vPro Features Driving Innovation

Top 5 Intel vPro Features Driving Innovation

Comments
5 min read
CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

Comments
4 min read
Bunster: Revolutionizing Shell Scripting with Secure, Portable Binaries

Bunster: Revolutionizing Shell Scripting with Secure, Portable Binaries

Comments
3 min read
Secure Data Handling - Part 1 - Understanding Encoding

Secure Data Handling - Part 1 - Understanding Encoding

Comments
2 min read
2-Factor Authentication OTP: TOTP & HOTP Algorithms

2-Factor Authentication OTP: TOTP & HOTP Algorithms

Comments
6 min read
MCP Is Rewriting the Rules of API Integration

MCP Is Rewriting the Rules of API Integration

1
Comments
8 min read
Understanding NACLs with AWS EC2 instances 🚀

Understanding NACLs with AWS EC2 instances 🚀

5
Comments
6 min read
Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Comments
3 min read
10 Free Vulnerability Scanners Every Developer Should Know in 2025

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Comments
2 min read
Access Control? Handled. Here's How I Built My DMS 🌠

Access Control? Handled. Here's How I Built My DMS 🌠

48
Comments 2
2 min read
API Audits and Security Testing: Best Practices

API Audits and Security Testing: Best Practices

Comments
13 min read
Finding and Remediating Idle AWS Databases Made Easy

Finding and Remediating Idle AWS Databases Made Easy

Comments
24 min read
Send reports safely via email(mailbox).

Send reports safely via email(mailbox).

Comments
7 min read
CATALYSIS ARCHITECTURE: NETWORKS

CATALYSIS ARCHITECTURE: NETWORKS

7
Comments
4 min read
Build a Safe and Simple Login System Using PHP and MySQL – A Complete Step-by-Step Tutorial "

Build a Safe and Simple Login System Using PHP and MySQL – A Complete Step-by-Step Tutorial "

1
Comments
2 min read
How I Passed the AWS Certified Security – Specialty (SCS-C02) Exam

How I Passed the AWS Certified Security – Specialty (SCS-C02) Exam

1
Comments 4
2 min read
loading...