Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
10 Free Vulnerability Scanners Every Developer Should Know in 2025

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Comments
2 min read
API Audits and Security Testing: Best Practices

API Audits and Security Testing: Best Practices

Comments
13 min read
Finding and Remediating Idle AWS Databases Made Easy

Finding and Remediating Idle AWS Databases Made Easy

Comments
24 min read
Send reports safely via email(mailbox).

Send reports safely via email(mailbox).

Comments
7 min read
CATALYSIS ARCHITECTURE: NETWORKS

CATALYSIS ARCHITECTURE: NETWORKS

7
Comments
4 min read
Build a Safe and Simple Login System Using PHP and MySQL – A Complete Step-by-Step Tutorial "

Build a Safe and Simple Login System Using PHP and MySQL – A Complete Step-by-Step Tutorial "

1
Comments
2 min read
How I Passed the AWS Certified Security – Specialty (SCS-C02) Exam

How I Passed the AWS Certified Security – Specialty (SCS-C02) Exam

1
Comments 4
2 min read
Why GRC Should Matter to Every Developer, Not Just Compliance Teams

Why GRC Should Matter to Every Developer, Not Just Compliance Teams

Comments
2 min read
Claiming Custody: A Real-World, Hands-On Guide to Linux File & Directory Ownership and Permissions

Claiming Custody: A Real-World, Hands-On Guide to Linux File & Directory Ownership and Permissions

6
Comments
5 min read
Exercise 01: Create and configure virtual networks

Exercise 01: Create and configure virtual networks

9
Comments
2 min read
02: Create and configure network security groups

02: Create and configure network security groups

6
Comments
3 min read
Exercise 03: Create and configure Azure Firewall

Exercise 03: Create and configure Azure Firewall

5
Comments
2 min read
EXPOSED! The Authorization Blind Spot!

EXPOSED! The Authorization Blind Spot!

6
Comments
5 min read
Frida vs. Obscured WebView: Diagnosing the Path to an iOS CAPTCHA Automation

Frida vs. Obscured WebView: Diagnosing the Path to an iOS CAPTCHA Automation

Comments
7 min read
🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

Comments
12 min read
PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

Comments
4 min read
🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

1
Comments
1 min read
The Inflation of "Security Researchers" and Its Consequences for Open Source

The Inflation of "Security Researchers" and Its Consequences for Open Source

Comments
6 min read
Is GitHub Sponsors Safe? A Comprehensive Guide to Secure Open Source Funding

Is GitHub Sponsors Safe? A Comprehensive Guide to Secure Open Source Funding

Comments
7 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
5 Cloud Migration Trends You Should Know in 2025

5 Cloud Migration Trends You Should Know in 2025

Comments
2 min read
Preventing Pointer Misuse in C++ via Compile-Time Sandboxing (Inspired by Gene Logic)

Preventing Pointer Misuse in C++ via Compile-Time Sandboxing (Inspired by Gene Logic)

Comments
1 min read
An Introduction to API Security Automation

An Introduction to API Security Automation

Comments
10 min read
For those about to Bedrock…

For those about to Bedrock…

Comments 1
6 min read
ICP Vetkey Quickstart Guide

ICP Vetkey Quickstart Guide

Comments
10 min read
loading...