Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'
Cover image for A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

Comments
1 min read
Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall
Cover image for Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

3
Comments
3 min read
Securing MCP Servers
Cover image for Securing MCP Servers

Securing MCP Servers

4
Comments
8 min read
How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security
Cover image for How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

6
Comments
3 min read
How to Create a Read-Only User in PostgreSQL (With Access to Statistics)
Cover image for How to Create a Read-Only User in PostgreSQL (With Access to Statistics)

How to Create a Read-Only User in PostgreSQL (With Access to Statistics)

Comments
2 min read
Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)
Cover image for Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)

Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)

Comments
3 min read
CVE-2022-46166 - Template Injection - Remote Code Execution

CVE-2022-46166 - Template Injection - Remote Code Execution

Comments
3 min read
Access and Refresh Tokens in Token-Based Authentication
Cover image for Access and Refresh Tokens in Token-Based Authentication

Access and Refresh Tokens in Token-Based Authentication

18
Comments 1
6 min read
Understand Bots and Protect Your Website from Bot Attacks
Cover image for Understand Bots and Protect Your Website from Bot Attacks

Understand Bots and Protect Your Website from Bot Attacks

Comments
4 min read
WebApp Security Checklist For Business in USA
Cover image for WebApp Security Checklist For Business in USA

WebApp Security Checklist For Business in USA

Comments
3 min read
How to Secure SSH Access with Short-Lived Certificates
Cover image for How to Secure SSH Access with Short-Lived Certificates

How to Secure SSH Access with Short-Lived Certificates

1
Comments
4 min read
How to Configure SSL Certificates in Nginx for Secure HTTPS Connections
Cover image for How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

1
Comments
2 min read
AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive
Cover image for AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive

AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive

Comments
4 min read
☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements
Cover image for ☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements

☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements

19
Comments 9
2 min read
RBAC Models Explained

RBAC Models Explained

3
Comments 4
5 min read
OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up
Cover image for OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up

OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up

13
Comments
5 min read
Dev Diary #2: Cloud Security plugin for JetBrains IDE
Cover image for Dev Diary #2: Cloud Security plugin for JetBrains IDE

Dev Diary #2: Cloud Security plugin for JetBrains IDE

Comments
3 min read
I built an AI-powered npm dependency scanner – give it 30 seconds & a package.json

I built an AI-powered npm dependency scanner – give it 30 seconds & a package.json

Comments
1 min read
Revival Hijacking: How Deleted PyPI Packages Become Threats
Cover image for Revival Hijacking: How Deleted PyPI Packages Become Threats

Revival Hijacking: How Deleted PyPI Packages Become Threats

Comments
6 min read
🧠 Tired of bloated ACLs? Meet scode-acl: A minimal, schema-driven, token-friendly access control system

🧠 Tired of bloated ACLs? Meet scode-acl: A minimal, schema-driven, token-friendly access control system

6
Comments 1
2 min read
Deploying and Securing a 3-tier application in Openshift

Deploying and Securing a 3-tier application in Openshift

Comments
1 min read
Redacting Sensitive Data On-the-Fly with S3 Object Lambda
Cover image for Redacting Sensitive Data On-the-Fly with S3 Object Lambda

Redacting Sensitive Data On-the-Fly with S3 Object Lambda

Comments
6 min read
Promptfoo x Qwen3-Coder: Unmasking Vulnerabilities in 480 Billion Parameters
Cover image for Promptfoo x Qwen3-Coder: Unmasking Vulnerabilities in 480 Billion Parameters

Promptfoo x Qwen3-Coder: Unmasking Vulnerabilities in 480 Billion Parameters

6
Comments
14 min read
How I Built NetNerve That Made Headlines a Day After It's Launch
Cover image for How I Built NetNerve That Made Headlines a Day After It's Launch

How I Built NetNerve That Made Headlines a Day After It's Launch

2
Comments
2 min read
Network Basics for Security
Cover image for Network Basics for Security

Network Basics for Security

2
Comments
1 min read
loading...