Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding and Implementing Content Security Policy (CSP) in Laravel
Cover image for Understanding and Implementing Content Security Policy (CSP) in Laravel

Understanding and Implementing Content Security Policy (CSP) in Laravel

5
Comments 1
4 min read
Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase
Cover image for Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

1
Comments
7 min read
Build a Virtual Private Cloud
Cover image for Build a Virtual Private Cloud

Build a Virtual Private Cloud

1
Comments
1 min read
Hacking Python functions by changing their source code
Cover image for Hacking Python functions by changing their source code

Hacking Python functions by changing their source code

Comments
2 min read
The Essential Features of Modern Physical Security Systems

The Essential Features of Modern Physical Security Systems

Comments
6 min read
Seeing an API Rate Limit Exceeded error? Here's How to Fix It!
Cover image for Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

2
Comments
9 min read
How to Download and Install FortiClient VPN for Your Windows PC

How to Download and Install FortiClient VPN for Your Windows PC

16
Comments 2
1 min read
Hacked by SharePoint: Extortion Pack
Cover image for Hacked by SharePoint: Extortion Pack

Hacked by SharePoint: Extortion Pack

5
Comments 1
9 min read
How to Securely Deploy Node App to Ubuntu Server
Cover image for How to Securely Deploy Node App to Ubuntu Server

How to Securely Deploy Node App to Ubuntu Server

7
Comments
11 min read
Protecting API Requests Using Nonce, Redis, and Time-Based Validation
Cover image for Protecting API Requests Using Nonce, Redis, and Time-Based Validation

Protecting API Requests Using Nonce, Redis, and Time-Based Validation

6
Comments 2
4 min read
How to Secure Your Next.js E-commerce Site with RBAC and Permit.io
Cover image for How to Secure Your Next.js E-commerce Site with RBAC and Permit.io

How to Secure Your Next.js E-commerce Site with RBAC and Permit.io

10
Comments
15 min read
I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

Comments
1 min read
How to evaluate the safety and security of LLM Applications?

How to evaluate the safety and security of LLM Applications?

1
Comments
1 min read
AWS Identity and Access Management (IAM) and Amazon MemoryDB Multi-Region
Cover image for AWS Identity and Access Management (IAM) and Amazon MemoryDB Multi-Region

AWS Identity and Access Management (IAM) and Amazon MemoryDB Multi-Region

Comments
5 min read
The Quest to Minimize False Positives Reaches Another Significant Milestone
Cover image for The Quest to Minimize False Positives Reaches Another Significant Milestone

The Quest to Minimize False Positives Reaches Another Significant Milestone

Comments
4 min read
How to Recover Access to BitLocker After Losing Your Password? 🔐
Cover image for How to Recover Access to BitLocker After Losing Your Password? 🔐

How to Recover Access to BitLocker After Losing Your Password? 🔐

1
Comments
2 min read
Securing a Web Application on Google Cloud Platform: Best Practices and Implementation
Cover image for Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Comments
4 min read
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies
Cover image for Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Comments
1 min read
Understanding Unique Keys in SQL: Ensuring Data Integrity

Understanding Unique Keys in SQL: Ensuring Data Integrity

Comments
2 min read
Streamline Your Organization Security Posture with NIST CSF 2.0
Cover image for Streamline Your Organization Security Posture with NIST CSF 2.0

Streamline Your Organization Security Posture with NIST CSF 2.0

Comments
12 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution
Cover image for The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention
Cover image for Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention

Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention

7
Comments
2 min read
Password Hashing in Python

Password Hashing in Python

Comments
1 min read
How to Hide Only API Keys Instead of Entire Files on GitHub and From Its Commit History
Cover image for How to Hide Only API Keys Instead of Entire Files on GitHub and From Its Commit History

How to Hide Only API Keys Instead of Entire Files on GitHub and From Its Commit History

6
Comments
3 min read
𝐒𝐈𝐄𝐌 𝐄𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝: 𝐖𝐡𝐚𝐭 𝐈𝐭 𝐈𝐬 𝐚𝐧𝐝 𝐖𝐡𝐲 𝐈𝐭’𝐬 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲?

𝐒𝐈𝐄𝐌 𝐄𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝: 𝐖𝐡𝐚𝐭 𝐈𝐭 𝐈𝐬 𝐚𝐧𝐝 𝐖𝐡𝐲 𝐈𝐭’𝐬 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲?

6
Comments
2 min read
loading...