Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
100 Days of DevOps: Day 7

100 Days of DevOps: Day 7

2
Comments
2 min read
Monitor HTTP Response Headers Like a Pro: Introducing Header Change Notifier for Burp Suite

Monitor HTTP Response Headers Like a Pro: Introducing Header Change Notifier for Burp Suite

Comments
2 min read
Introducing JWTauditor: Your Ultimate Burp Suite Extension for Passive JWT Security Analysis
Cover image for Introducing JWTauditor: Your Ultimate Burp Suite Extension for Passive JWT Security Analysis

Introducing JWTauditor: Your Ultimate Burp Suite Extension for Passive JWT Security Analysis

1
Comments
2 min read
Securing Your Code with AWS Inspector: A Comprehensive Guide to Code Security Scanning

Securing Your Code with AWS Inspector: A Comprehensive Guide to Code Security Scanning

3
Comments
4 min read
Secure Kubernetes External Access with ExternalDNS and cert-manager

Secure Kubernetes External Access with ExternalDNS and cert-manager

Comments
1 min read
Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks
Cover image for Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks

Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks

1
Comments 1
4 min read
Cybersecurity Learning Journey: Reposting with Clarity
Cover image for Cybersecurity Learning Journey: Reposting with Clarity

Cybersecurity Learning Journey: Reposting with Clarity

1
Comments 1
2 min read
Cybr - Introduction to AWS Security

Cybr - Introduction to AWS Security

Comments
1 min read
Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe
Cover image for Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe

Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe

Comments
5 min read
Security news weekly round-up - 8th August 2025
Cover image for Security news weekly round-up - 8th August 2025

Security news weekly round-up - 8th August 2025

1
Comments
4 min read
How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design
Cover image for How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design

How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design

1
Comments
4 min read
Secure Your Network Using Termux Scanning Tools

Secure Your Network Using Termux Scanning Tools

2
Comments
4 min read
Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)
Cover image for Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)

Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)

1
Comments
4 min read
Unmasking the Man in the Middle – The Secrets of Secure Connections
Cover image for Unmasking the Man in the Middle – The Secrets of Secure Connections

Unmasking the Man in the Middle – The Secrets of Secure Connections

Comments
6 min read
SSIS Tip: How to Check the Project or Package Protection Level
Cover image for SSIS Tip: How to Check the Project or Package Protection Level

SSIS Tip: How to Check the Project or Package Protection Level

Comments
1 min read
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

1
Comments
3 min read
Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching
Cover image for Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

Comments
8 min read
Security Briefing: Security Flaw Analysis

Security Briefing: Security Flaw Analysis

2
Comments
3 min read
Threat Advisory: Security Flaw Defense

Threat Advisory: Security Flaw Defense

1
Comments
1 min read
Critical Security Flaw: Security Flaw Techniques

Critical Security Flaw: Security Flaw Techniques

1
Comments
1 min read
Security Analysis: None

Security Analysis: None

1
Comments
3 min read
Threat Intelligence: Security Flaw Exploitation

Threat Intelligence: Security Flaw Exploitation

1
Comments
1 min read
AI-Generated Code in 2025: The Silent Security Crisis Developers Can’t Ignore

AI-Generated Code in 2025: The Silent Security Crisis Developers Can’t Ignore

2
Comments
3 min read
OWASP Cornucopia Companion Edition
Cover image for OWASP Cornucopia Companion Edition

OWASP Cornucopia Companion Edition

3
Comments
2 min read
How to Deploy SafeLine WAF on a cPanel VPS

How to Deploy SafeLine WAF on a cPanel VPS

5
Comments
2 min read
loading...