Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
DevSecOps: How I Made Our Desktop App Updates Safe
Cover image for DevSecOps: How I Made Our Desktop App Updates Safe

DevSecOps: How I Made Our Desktop App Updates Safe

2
Comments
4 min read
Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments 1
3 min read
The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have
Cover image for The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

Comments
5 min read
Russian hackers deploy zero-day attack on government email systems
Cover image for Russian hackers deploy zero-day attack on government email systems

Russian hackers deploy zero-day attack on government email systems

Comments 1
3 min read
I Made NR34P3R: Fast Multi-Threaded Port Scanner for Detecting Open Ports & Services

I Made NR34P3R: Fast Multi-Threaded Port Scanner for Detecting Open Ports & Services

Comments
2 min read
I Made CR4SH3R: Tool for Automating Vulnerability Detection in WordPress Plugins

I Made CR4SH3R: Tool for Automating Vulnerability Detection in WordPress Plugins

Comments
2 min read
When the CDN Blinks: Endpoint Obfuscation, TTL Conflict, and Behavioral Web Architecture

When the CDN Blinks: Endpoint Obfuscation, TTL Conflict, and Behavioral Web Architecture

Comments
3 min read
🔐 Secure Auth Token Handling in the Frontend: When Your Client Needs the Token

🔐 Secure Auth Token Handling in the Frontend: When Your Client Needs the Token

12
Comments 2
3 min read
Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Comments 1
5 min read
Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Comments
4 min read
AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking
Cover image for AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking

AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking

1
Comments 1
4 min read
Introduction to IAM in Oracle Cloud Infrastructure
Cover image for Introduction to IAM in Oracle Cloud Infrastructure

Introduction to IAM in Oracle Cloud Infrastructure

6
Comments 2
3 min read
Security news weekly round-up - 20th June 2025
Cover image for Security news weekly round-up - 20th June 2025

Security news weekly round-up - 20th June 2025

1
Comments
5 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide
Cover image for How to Prevent Phishing Attacks: A Technical Implementation Guide

How to Prevent Phishing Attacks: A Technical Implementation Guide

Comments
2 min read
VPC Traffic Flow and Security
Cover image for VPC Traffic Flow and Security

VPC Traffic Flow and Security

Comments
7 min read
Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security
Cover image for Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security

Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security

2
Comments 1
4 min read
Secure .NET App with Google Authentication (Step-by-Step)

Secure .NET App with Google Authentication (Step-by-Step)

1
Comments
4 min read
Flutter Security: Top Best Practices

Flutter Security: Top Best Practices

Comments
6 min read
Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Comments
2 min read
What’s Happening Inside Your Linux Kernel?
Cover image for What’s Happening Inside Your Linux Kernel?

What’s Happening Inside Your Linux Kernel?

6
Comments
4 min read
Secure CI/CD 2025: How I Harden GitLab at Scale

Secure CI/CD 2025: How I Harden GitLab at Scale

Comments
1 min read
Day 11 : FastAPI Auth: Login with JWT & Route Protection
Cover image for Day 11 : FastAPI Auth: Login with JWT & Route Protection

Day 11 : FastAPI Auth: Login with JWT & Route Protection

2
Comments
6 min read
Specter-AAL

Specter-AAL

3
Comments
2 min read
Real-Time API Token Leak Detection & Response with Python
Cover image for Real-Time API Token Leak Detection & Response with Python

Real-Time API Token Leak Detection & Response with Python

Comments
1 min read
Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP
Cover image for Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Comments
3 min read
loading...