Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
(Part 4) Remote Attestation: How to Prove You Aren't a Dog on the Internet 🐶
Cover image for (Part 4) Remote Attestation: How to Prove You Aren't a Dog on the Internet 🐶

(Part 4) Remote Attestation: How to Prove You Aren't a Dog on the Internet 🐶

1
Comments 1
4 min read
Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command
Cover image for Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Comments
3 min read
From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps
Cover image for From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

Comments
7 min read
Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown
Cover image for Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown

Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown

Comments
5 min read
Technical Deep Dive: How React Server Components Work and Where the Vulnerabilities Appear
Cover image for Technical Deep Dive: How React Server Components Work and Where the Vulnerabilities Appear

Technical Deep Dive: How React Server Components Work and Where the Vulnerabilities Appear

Comments 1
4 min read
La sécurité simplement : une approche haut-niveau
Cover image for La sécurité simplement : une approche haut-niveau

La sécurité simplement : une approche haut-niveau

Comments
7 min read
Beyond the Wire: Encrypting Messages Where the Message Never Exists

Beyond the Wire: Encrypting Messages Where the Message Never Exists

Comments
3 min read
7 Azure Security Gaps I have Seen in Production (and How to Fix Them)

7 Azure Security Gaps I have Seen in Production (and How to Fix Them)

2
Comments
4 min read
Laravel Bastion: Stripe-Style API Authentication for Laravel
Cover image for Laravel Bastion: Stripe-Style API Authentication for Laravel

Laravel Bastion: Stripe-Style API Authentication for Laravel

Comments
1 min read
Day 15 — How to Respond to an Ongoing Compromise (Hawk's Path)
Cover image for Day 15 — How to Respond to an Ongoing Compromise (Hawk's Path)

Day 15 — How to Respond to an Ongoing Compromise (Hawk's Path)

Comments
2 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
Cover image for Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
Building a Simple, Secure File Upload System with AWS Lambda and S3

Building a Simple, Secure File Upload System with AWS Lambda and S3

Comments
2 min read
AI Agents Deleting Home Folders? Run Your Agent in Firejail and Stay Safe
Cover image for AI Agents Deleting Home Folders? Run Your Agent in Firejail and Stay Safe

AI Agents Deleting Home Folders? Run Your Agent in Firejail and Stay Safe

5
Comments
8 min read
How to Secure a Linux Server for Node.js (Beginner-Friendly, Step by Step)
Cover image for How to Secure a Linux Server for Node.js (Beginner-Friendly, Step by Step)

How to Secure a Linux Server for Node.js (Beginner-Friendly, Step by Step)

Comments
4 min read
How to Deploy Applications Securely on a Linux Server (A Production-Grade, Framework-Agnostic Guide)
Cover image for How to Deploy Applications Securely on a Linux Server (A Production-Grade, Framework-Agnostic Guide)

How to Deploy Applications Securely on a Linux Server (A Production-Grade, Framework-Agnostic Guide)

Comments
4 min read
The Most Common Website Security Issues
Cover image for The Most Common Website Security Issues

The Most Common Website Security Issues

Comments
2 min read
How Shadow IT Turns Employees Into Unintentional Insider Threats
Cover image for How Shadow IT Turns Employees Into Unintentional Insider Threats

How Shadow IT Turns Employees Into Unintentional Insider Threats

Comments
5 min read
Why Your AI-Generated Code is Probably Garbage (And How to Fix It)
Cover image for Why Your AI-Generated Code is Probably Garbage (And How to Fix It)

Why Your AI-Generated Code is Probably Garbage (And How to Fix It)

Comments
16 min read
We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)
Cover image for We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)

We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)

Comments
2 min read
Why Traditional Linters Miss Critical Bugs (And What AI Can Do About It)

Why Traditional Linters Miss Critical Bugs (And What AI Can Do About It)

Comments
8 min read
Start Here: PainTracker + CrisisCore Build Log (Privacy-First, Offline-First, No Surveillance)

Start Here: PainTracker + CrisisCore Build Log (Privacy-First, Offline-First, No Surveillance)

Comments
1 min read
Goodbye to Static Credentials: Embrace Modern Identity Practices
Cover image for Goodbye to Static Credentials: Embrace Modern Identity Practices

Goodbye to Static Credentials: Embrace Modern Identity Practices

1
Comments
5 min read
SQL Injection Audit Challenge Week 1
Cover image for SQL Injection Audit Challenge Week 1

SQL Injection Audit Challenge Week 1

Comments
27 min read
How Quality Assurance Engineers Can Strengthen Application Security
Cover image for How Quality Assurance Engineers Can Strengthen Application Security

How Quality Assurance Engineers Can Strengthen Application Security

Comments
2 min read
Why CAPTCHAs today are so bad (and what we should be building instead)

Why CAPTCHAs today are so bad (and what we should be building instead)

1
Comments
1 min read
loading...