Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enhancing security for Lambda function URLs

Enhancing security for Lambda function URLs

2
Comments
6 min read
Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

3
Comments
5 min read
Scopes and Claims Explained

Scopes and Claims Explained

2
Comments
3 min read
HTTP Tools for Security Researchers and Pen Testers

HTTP Tools for Security Researchers and Pen Testers

6
Comments 4
3 min read
Optimise and Secure AWS HTTP API Gateway by locking down direct access

Optimise and Secure AWS HTTP API Gateway by locking down direct access

2
Comments
8 min read
Security: We have been Fooled.

Security: We have been Fooled.

3
Comments
3 min read
Snyk CLI: Introducing Semantic Versioning and release channels

Snyk CLI: Introducing Semantic Versioning and release channels

2
Comments
4 min read
Securing Self-Hosted Services with CF Tunnel Gate

Securing Self-Hosted Services with CF Tunnel Gate

Comments
5 min read
Warn And Log Out User Due To Inactivity In Angular App

Warn And Log Out User Due To Inactivity In Angular App

Comments
3 min read
How to restrict default access to KMS via key policy

How to restrict default access to KMS via key policy

2
Comments
3 min read
Navigating Early Career Hurdles: Security (Keeping User Data Safe as a Frontend Engineer)

Navigating Early Career Hurdles: Security (Keeping User Data Safe as a Frontend Engineer)

6
Comments
4 min read
Using NetBird for Kubernetes Access

Using NetBird for Kubernetes Access

4
Comments
11 min read
SCaLE 21x: A Community Event About Much More Than Linux

SCaLE 21x: A Community Event About Much More Than Linux

1
Comments
12 min read
Shared Access Signature

Shared Access Signature

4
Comments
4 min read
Convert to workload identity federation

Convert to workload identity federation

Comments
2 min read
Interactive description of iptables tables

Interactive description of iptables tables

Comments
1 min read
AI Tools of the 21st Century: Humanoid Robots

AI Tools of the 21st Century: Humanoid Robots

4
Comments
1 min read
Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻🔐

Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻🔐

Comments
4 min read
keepsecret.py: a simple way to encrypt secret files in your repository

keepsecret.py: a simple way to encrypt secret files in your repository

3
Comments
4 min read
Process and data isolation strategies pt. 1 - Sandboxes and Process imprisonment

Process and data isolation strategies pt. 1 - Sandboxes and Process imprisonment

Comments
4 min read
How to get the verified badge on GitHub with SSH key signing

How to get the verified badge on GitHub with SSH key signing

2
Comments
1 min read
HackTheBox - Writeup Builder [Retired]

HackTheBox - Writeup Builder [Retired]

1
Comments
11 min read
HackTheBox - Writeup Devvortex [Retired]

HackTheBox - Writeup Devvortex [Retired]

Comments
12 min read
How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

Comments
4 min read
Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Comments
2 min read
Why you should sign your commits, and not only how.

Why you should sign your commits, and not only how.

7
Comments
3 min read
Security news weekly round-up - 26th April 2024

Security news weekly round-up - 26th April 2024

2
Comments
3 min read
PostgreSQL. How to check connections that are not using SSL encryption?

PostgreSQL. How to check connections that are not using SSL encryption?

2
Comments
2 min read
How Do Free Apps Make Money?

How Do Free Apps Make Money?

5
Comments
5 min read
Enhancing Customer Workloads

Enhancing Customer Workloads

Comments
4 min read
Creating Passkey Authentication in a Rails 7 Application

Creating Passkey Authentication in a Rails 7 Application

1
Comments
4 min read
DynamoDB now supports resource-based policies. But is that a good idea?

DynamoDB now supports resource-based policies. But is that a good idea?

Comments
5 min read
What Kills Your Flash Drive and How You Can Avoid It?

What Kills Your Flash Drive and How You Can Avoid It?

1
Comments
3 min read
Best Practices for API Authentication and Authorization

Best Practices for API Authentication and Authorization

1
Comments
8 min read
Secrets in Lambda Env Vars

Secrets in Lambda Env Vars

6
Comments
3 min read
For developers: you must not require needs passwords from users

For developers: you must not require needs passwords from users

15
Comments 22
4 min read
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

3
Comments
11 min read
Importance of Security Groups (SGs) and Network Access Control Lists (NACLs) in AWS

Importance of Security Groups (SGs) and Network Access Control Lists (NACLs) in AWS

Comments
6 min read
Llavero Wallet: My Vault

Llavero Wallet: My Vault

3
Comments 1
4 min read
Securing Your Site: Obtain an SSL Certificate with Let’s Encrypt When Your ISP Blocks Port 80

Securing Your Site: Obtain an SSL Certificate with Let’s Encrypt When Your ISP Blocks Port 80

Comments
3 min read
The Open-Source Backdoor That Almost Compromised SSH

The Open-Source Backdoor That Almost Compromised SSH

2
Comments
3 min read
🎭 XSS Exposed: The Good, the Bad, and the Ugly! 🧑‍💻

🎭 XSS Exposed: The Good, the Bad, and the Ugly! 🧑‍💻

6
Comments
2 min read
Elevate Your DevOps and Cloud Engineering Journey

Elevate Your DevOps and Cloud Engineering Journey

Comments
4 min read
Create Certificate Authority with AWS Private CA SDK

Create Certificate Authority with AWS Private CA SDK

4
Comments
4 min read
pfSense Quickstart

pfSense Quickstart

Comments
2 min read
pfSense basic firewall setup

pfSense basic firewall setup

Comments
1 min read
COMMON VULNERABILITIES: REENTRANCY PART — II

COMMON VULNERABILITIES: REENTRANCY PART — II

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — I

COMMON VULNERABILITIES: REENTRANCY PART — I

Comments
7 min read
How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

1
Comments
6 min read
Security: Why the "XZ backdoor" is worrying

Security: Why the "XZ backdoor" is worrying

2
Comments 1
2 min read
AWS Guard Duty

AWS Guard Duty

4
Comments 2
3 min read
Secure Password Sharing with my Remote Workers

Secure Password Sharing with my Remote Workers

5
Comments
5 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

5
Comments
5 min read
Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

3
Comments
3 min read
GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

1
Comments
5 min read
ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

2
Comments
6 min read
Password Management: The Basics

Password Management: The Basics

11
Comments 9
10 min read
The XZ attack and timeline

The XZ attack and timeline

25
Comments 3
6 min read
Cors Workflow

Cors Workflow

1
Comments
2 min read
Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

7
Comments
2 min read
loading...