Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 18th July 2025
Cover image for Security news weekly round-up - 18th July 2025

Security news weekly round-up - 18th July 2025

1
Comments
5 min read
🔥 The Agent Registry Is a Trojan Horse
Cover image for 🔥 The Agent Registry Is a Trojan Horse

🔥 The Agent Registry Is a Trojan Horse

8
Comments 1
2 min read
Secure SSH Access with Modular Policy Files
Cover image for Secure SSH Access with Modular Policy Files

Secure SSH Access with Modular Policy Files

1
Comments
5 min read
Top 10 Web Application Penetration Testing Tools
Cover image for Top 10 Web Application Penetration Testing Tools

Top 10 Web Application Penetration Testing Tools

1
Comments 2
9 min read
Provide shared file storage for the company offices
Cover image for Provide shared file storage for the company offices

Provide shared file storage for the company offices

Comments
5 min read
How Hackers Are Using AI in 2025 (Urgent Attention)
Cover image for How Hackers Are Using AI in 2025 (Urgent Attention)

How Hackers Are Using AI in 2025 (Urgent Attention)

6
Comments 1
6 min read
How to setup Corporate Identity Access at scale in AWS?
Cover image for How to setup Corporate Identity Access at scale in AWS?

How to setup Corporate Identity Access at scale in AWS?

Comments
5 min read
Top Apple Device Management Software for 2025 | Easy & Secure

Top Apple Device Management Software for 2025 | Easy & Secure

Comments
4 min read
Mastering Docker from Scratch to Scale – A Hands-On Guide with Labs, CI/CD, Security & DCA Prep
Cover image for Mastering Docker from Scratch to Scale – A Hands-On Guide with Labs, CI/CD, Security & DCA Prep

Mastering Docker from Scratch to Scale – A Hands-On Guide with Labs, CI/CD, Security & DCA Prep

Comments
2 min read
Sessions vs JWTs: Not Just Two Ways to Authenticate

Sessions vs JWTs: Not Just Two Ways to Authenticate

Comments 1
4 min read
Forensic Walkthrough: Decoding the ResupplyFi Attack Contract

Forensic Walkthrough: Decoding the ResupplyFi Attack Contract

Comments
3 min read
AI 'Nudify' Websites Are Raking in Millions of Dollars
Cover image for AI 'Nudify' Websites Are Raking in Millions of Dollars

AI 'Nudify' Websites Are Raking in Millions of Dollars

2
Comments
1 min read
Protect your instances from attackers! Install Portsentry
Cover image for Protect your instances from attackers! Install Portsentry

Protect your instances from attackers! Install Portsentry

3
Comments
14 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js: script-src and connect-src

Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js: script-src and connect-src

1
Comments
3 min read
A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game
Cover image for A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game

A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game

5
Comments
4 min read
Why Enterprise Risk Management Must Include Secure Translation

Why Enterprise Risk Management Must Include Secure Translation

9
Comments
3 min read
Challenge: Upload File Path Traversal
Cover image for Challenge: Upload File Path Traversal

Challenge: Upload File Path Traversal

Comments 2
3 min read
Why Your CI Pipeline Needs Network Security (And How We Built It)
Cover image for Why Your CI Pipeline Needs Network Security (And How We Built It)

Why Your CI Pipeline Needs Network Security (And How We Built It)

Comments
3 min read
Authenticate Connect-MgGraph using OIDC in GitHub Actions
Cover image for Authenticate Connect-MgGraph using OIDC in GitHub Actions

Authenticate Connect-MgGraph using OIDC in GitHub Actions

Comments
1 min read
Secure Shell, Real Power: A Developer’s Guide to SSH
Cover image for Secure Shell, Real Power: A Developer’s Guide to SSH

Secure Shell, Real Power: A Developer’s Guide to SSH

1
Comments 1
8 min read
TIL: How I Set Up My DEV Blog

TIL: How I Set Up My DEV Blog

Comments
1 min read
🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

12
Comments 3
2 min read
Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!
Cover image for Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!

Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!

Comments
2 min read
AWS Certificate Manager Now Offers Exportable Public Certificates
Cover image for AWS Certificate Manager Now Offers Exportable Public Certificates

AWS Certificate Manager Now Offers Exportable Public Certificates

Comments
2 min read
What is HashId? Why Should Developers Use HashId to Secure APIs?
Cover image for What is HashId? Why Should Developers Use HashId to Secure APIs?

What is HashId? Why Should Developers Use HashId to Secure APIs?

Comments
4 min read
loading...