Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Telegram Username Scam: How People Are Losing Thousands in TON
Cover image for The Telegram Username Scam: How People Are Losing Thousands in TON

The Telegram Username Scam: How People Are Losing Thousands in TON

10
Comments 9
7 min read
Building Secure C# Applications: A Comprehensive Guide

Building Secure C# Applications: A Comprehensive Guide

Comments
5 min read
The Risk of Registry Injection Attacks with shadcn
Cover image for The Risk of Registry Injection Attacks with shadcn

The Risk of Registry Injection Attacks with shadcn

11
Comments 1
3 min read
Sending Email Notifications on SSH Login Events

Sending Email Notifications on SSH Login Events

Comments
2 min read
Spring4Shell Vulnerability: What You Need to Know

Spring4Shell Vulnerability: What You Need to Know

5
Comments
3 min read
Implementing Multi-Factor Authentication in Azure
Cover image for Implementing Multi-Factor Authentication in Azure

Implementing Multi-Factor Authentication in Azure

1
Comments
5 min read
A Quiz to Explore AI Safety and Trust-Based Access to Advanced Systems

A Quiz to Explore AI Safety and Trust-Based Access to Advanced Systems

1
Comments
1 min read
NeuroShellOS Privacy Edition — A New Vision for Operating System-Level Privacy

NeuroShellOS Privacy Edition — A New Vision for Operating System-Level Privacy

5
Comments
1 min read
Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Comments
4 min read
Dissecting Kubewarden: Internals, How It's Built, and Its Place Among Policy Engines
Cover image for Dissecting Kubewarden: Internals, How It's Built, and Its Place Among Policy Engines

Dissecting Kubewarden: Internals, How It's Built, and Its Place Among Policy Engines

2
Comments
8 min read
MCP 2025-06-18 Spec Update: Security, Structured Output & Elicitation
Cover image for MCP 2025-06-18 Spec Update: Security, Structured Output & Elicitation

MCP 2025-06-18 Spec Update: Security, Structured Output & Elicitation

52
Comments 2
11 min read
How I Secured Passwords in My Spring Boot Project (N1netails) Using BCrypt
Cover image for How I Secured Passwords in My Spring Boot Project (N1netails) Using BCrypt

How I Secured Passwords in My Spring Boot Project (N1netails) Using BCrypt

3
Comments
5 min read
Best Practices for Creating Strong and Secure Passwords

Best Practices for Creating Strong and Secure Passwords

Comments
4 min read
🎲 Python’s random vs secrets — What’s the real difference?
Cover image for 🎲 Python’s random vs secrets — What’s the real difference?

🎲 Python’s random vs secrets — What’s the real difference?

Comments
1 min read
🧭 Selecting the Right Bug Bounty Targets & Reconnaissance

🧭 Selecting the Right Bug Bounty Targets & Reconnaissance

Comments
24 min read
Data at Risk: The Hidden Costs of AI Growth
Cover image for Data at Risk: The Hidden Costs of AI Growth

Data at Risk: The Hidden Costs of AI Growth

6
Comments
3 min read
🛡️ Blocking Admin SSH Logins with SELinux (`ssh_sysadm_login`)
Cover image for 🛡️ Blocking Admin SSH Logins with SELinux (`ssh_sysadm_login`)

🛡️ Blocking Admin SSH Logins with SELinux (`ssh_sysadm_login`)

Comments
3 min read
🔐What, Why, How, Where, When of AWS CloudHSM...
Cover image for 🔐What, Why, How, Where, When of AWS CloudHSM...

🔐What, Why, How, Where, When of AWS CloudHSM...

1
Comments
3 min read
How to Create a Local Chatbot Without Coding in Less Than 10 Minutes on AI PCs
Cover image for How to Create a Local Chatbot Without Coding in Less Than 10 Minutes on AI PCs

How to Create a Local Chatbot Without Coding in Less Than 10 Minutes on AI PCs

51
Comments 20
6 min read
Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Comments
3 min read
Ransomware Explained: How It Works and How to Defend Against It

Ransomware Explained: How It Works and How to Defend Against It

Comments
4 min read
What Is a DDoS Attack? Causes, Effects, and Prevention Tips

What Is a DDoS Attack? Causes, Effects, and Prevention Tips

Comments
4 min read
What Is Phishing? Real-Life Examples and Protection Tips

What Is Phishing? Real-Life Examples and Protection Tips

Comments
3 min read
🔐☁️Kancha’s Guide to AWS Infrastructure Protection: Securing the Cloud with Amazon Inspector
Cover image for 🔐☁️Kancha’s Guide to AWS Infrastructure Protection: Securing the Cloud with Amazon Inspector

🔐☁️Kancha’s Guide to AWS Infrastructure Protection: Securing the Cloud with Amazon Inspector

Comments
2 min read
IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

Comments 2
4 min read
loading...