Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Do You Really Know Where Your API Keys End Up? A Security Guide for Fintech Developers

Do You Really Know Where Your API Keys End Up? A Security Guide for Fintech Developers

26
Comments 3
8 min read
🕸️ The Final Boss of Web Scraping: A Streamlit-Powered, Multi-Page Ethical Scraper.

🕸️ The Final Boss of Web Scraping: A Streamlit-Powered, Multi-Page Ethical Scraper.

11
Comments
3 min read
Passwords Are a Ticking Timebomb—And These Breaches Prove It

Passwords Are a Ticking Timebomb—And These Breaches Prove It

Comments
2 min read
Refactoring 028 - Replace Consecutive IDs with Dark Keys

Refactoring 028 - Replace Consecutive IDs with Dark Keys

1
Comments 1
8 min read
Securing Remote Work Environments with VPNs

Securing Remote Work Environments with VPNs

5
Comments 3
3 min read
AutoSecure API Gateway: Permissions Redefined

AutoSecure API Gateway: Permissions Redefined

Comments
4 min read
QuickCollab - Permissions- First Workspace Collaboration App

QuickCollab - Permissions- First Workspace Collaboration App

Comments 1
2 min read
HPKP: What is HTTP Public Key Pinning?

HPKP: What is HTTP Public Key Pinning?

Comments
5 min read
How to Stand Strong Against Cyberbullying

How to Stand Strong Against Cyberbullying

Comments
3 min read
TUI tool for generating packets of arbitrary input and monitoring packets!

TUI tool for generating packets of arbitrary input and monitoring packets!

1
Comments
1 min read
The Rising Threat of OTP Scams and How to Stay Safe

The Rising Threat of OTP Scams and How to Stay Safe

Comments
3 min read
Incognito Mode Is a Lie Here’s Who Still Sees You

Incognito Mode Is a Lie Here’s Who Still Sees You

Comments
3 min read
Lock Down Your Account: Enforcing 2FA Setup on Login

Lock Down Your Account: Enforcing 2FA Setup on Login

Comments
1 min read
Future of Identity Security: What's Coming Next?

Future of Identity Security: What's Coming Next?

Comments
1 min read
WordPress Nonces: Your First Line of Defense Against CSRF

WordPress Nonces: Your First Line of Defense Against CSRF

1
Comments
1 min read
Debugging Memory Leaks in Node.js: A Complete Guide to heapdump, clinic.js, and v8-tools

Debugging Memory Leaks in Node.js: A Complete Guide to heapdump, clinic.js, and v8-tools

Comments 1
6 min read
How to verify your cookie consent is working 🍪🍪

How to verify your cookie consent is working 🍪🍪

1
Comments
1 min read
What If DeFi Could Defend Itself? Meet Drosera.

What If DeFi Could Defend Itself? Meet Drosera.

11
Comments 1
2 min read
Understanding Malware Types and Detection Methods

Understanding Malware Types and Detection Methods

2
Comments 2
3 min read
Splunk Dashboards

Splunk Dashboards

Comments
4 min read
Privacy & Data Protection

Privacy & Data Protection

1
Comments 1
3 min read
The Elegant Art of Killing 'unsafe-inline' in Your CSP

The Elegant Art of Killing 'unsafe-inline' in Your CSP

Comments
4 min read
Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Comments
6 min read
Infineon Technologies: Pioneering Security, Sustainability, and Open Innovation

Infineon Technologies: Pioneering Security, Sustainability, and Open Innovation

1
Comments
8 min read
How We Helped Teams Remediate 95% of Container CVEs Without Code Changes

How We Helped Teams Remediate 95% of Container CVEs Without Code Changes

6
Comments
2 min read
loading...