Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Made CR4SH3R: Tool for Automating Vulnerability Detection in WordPress Plugins

I Made CR4SH3R: Tool for Automating Vulnerability Detection in WordPress Plugins

Comments
2 min read
When the CDN Blinks: Endpoint Obfuscation, TTL Conflict, and Behavioral Web Architecture

When the CDN Blinks: Endpoint Obfuscation, TTL Conflict, and Behavioral Web Architecture

Comments
3 min read
🔐 Secure Auth Token Handling in the Frontend: When Your Client Needs the Token

🔐 Secure Auth Token Handling in the Frontend: When Your Client Needs the Token

12
Comments 2
3 min read
Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Comments 1
5 min read
Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Comments
4 min read
AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking
Cover image for AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking

AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking

1
Comments 1
4 min read
Introduction to IAM in Oracle Cloud Infrastructure
Cover image for Introduction to IAM in Oracle Cloud Infrastructure

Introduction to IAM in Oracle Cloud Infrastructure

6
Comments 2
3 min read
The Ultimate Guide to SSH Hardening: Secure Your Remote Access
Cover image for The Ultimate Guide to SSH Hardening: Secure Your Remote Access

The Ultimate Guide to SSH Hardening: Secure Your Remote Access

1
Comments
4 min read
Security news weekly round-up - 20th June 2025
Cover image for Security news weekly round-up - 20th June 2025

Security news weekly round-up - 20th June 2025

1
Comments
5 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide
Cover image for How to Prevent Phishing Attacks: A Technical Implementation Guide

How to Prevent Phishing Attacks: A Technical Implementation Guide

Comments
2 min read
VPC Traffic Flow and Security
Cover image for VPC Traffic Flow and Security

VPC Traffic Flow and Security

Comments
7 min read
Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security
Cover image for Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security

Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security

2
Comments 1
4 min read
Secure .NET App with Google Authentication (Step-by-Step)

Secure .NET App with Google Authentication (Step-by-Step)

1
Comments
4 min read
Flutter Security: Top Best Practices

Flutter Security: Top Best Practices

Comments
6 min read
Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Comments
2 min read
What’s Happening Inside Your Linux Kernel?
Cover image for What’s Happening Inside Your Linux Kernel?

What’s Happening Inside Your Linux Kernel?

6
Comments
4 min read
Secure CI/CD 2025: How I Harden GitLab at Scale

Secure CI/CD 2025: How I Harden GitLab at Scale

Comments
1 min read
Day 11 : FastAPI Auth: Login with JWT & Route Protection
Cover image for Day 11 : FastAPI Auth: Login with JWT & Route Protection

Day 11 : FastAPI Auth: Login with JWT & Route Protection

2
Comments
6 min read
Specter-AAL

Specter-AAL

3
Comments
2 min read
Real-Time API Token Leak Detection & Response with Python
Cover image for Real-Time API Token Leak Detection & Response with Python

Real-Time API Token Leak Detection & Response with Python

Comments
1 min read
Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP
Cover image for Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Comments
3 min read
WordPress Roles & Capabilities: A Practical Guide
Cover image for WordPress Roles & Capabilities: A Practical Guide

WordPress Roles & Capabilities: A Practical Guide

Comments
1 min read
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks
Cover image for Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
Handling password-protected PDFs in Javascript
Cover image for Handling password-protected PDFs in Javascript

Handling password-protected PDFs in Javascript

1
Comments
6 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them
Cover image for Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Comments
5 min read
loading...