Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

1
Comments
1 min read
CORS Error Explained and How to Fix It?

CORS Error Explained and How to Fix It?

27
Comments 3
3 min read
Secure protected API with HMAC! Next Level of API Keys 🔐

Secure protected API with HMAC! Next Level of API Keys 🔐

6
Comments
4 min read
Preventing SQL Injection with Golang

Preventing SQL Injection with Golang

110
Comments 7
8 min read
Tracking your security posture in AWS

Tracking your security posture in AWS

2
Comments
4 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
Segurança de IA

Segurança de IA

1
Comments
6 min read
The internet is on fire again. This time it's XZ

The internet is on fire again. This time it's XZ

1
Comments 1
3 min read
Server access with SSH certificates - deep dive

Server access with SSH certificates - deep dive

1
Comments
3 min read
HackTheBox - Writeup Analytics

HackTheBox - Writeup Analytics

Comments
9 min read
Security news weekly round-up - 29th March 2024

Security news weekly round-up - 29th March 2024

5
Comments 1
4 min read
An Introductory Guide to AWS Identity and Access Management

An Introductory Guide to AWS Identity and Access Management

Comments
3 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

2
Comments
6 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

2
Comments
2 min read
How to implement HTTPS in Local Networks Using Let's Encrypt

How to implement HTTPS in Local Networks Using Let's Encrypt

61
Comments 3
8 min read
60 Years of the IBM System/360: A Legacy of Reliability and Security

60 Years of the IBM System/360: A Legacy of Reliability and Security

2
Comments 1
2 min read
How to Hack (and secure) Serverless Applications

How to Hack (and secure) Serverless Applications

4
Comments
6 min read
Securing iOS Private and Public Keys with Apple Hardware Technology

Securing iOS Private and Public Keys with Apple Hardware Technology

Comments
1 min read
What is an authorization API?

What is an authorization API?

Comments
6 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
Make your Azure OpenAI apps compliant with RBAC

Make your Azure OpenAI apps compliant with RBAC

24
Comments
6 min read
Demystifying OAuth 2.0 with a Clubbing Analogy

Demystifying OAuth 2.0 with a Clubbing Analogy

2
Comments
3 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

1
Comments
2 min read
API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

6
Comments
3 min read
O que ĂŠ HTTP?

O que ĂŠ HTTP?

1
Comments
3 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

Comments 2
3 min read
AutomatizaciĂłn para la creaciĂłn de imĂĄgenes con Amazon EC2 Image Builder

AutomatizaciĂłn para la creaciĂłn de imĂĄgenes con Amazon EC2 Image Builder

3
Comments
14 min read
Securing the Cloud #23

Securing the Cloud #23

Comments
7 min read
🤖 Building RAG chatbot with NeMo Guardrails !💡

🤖 Building RAG chatbot with NeMo Guardrails !💡

1
Comments
2 min read
Understanding Firewalls: Your First Line of Cyber Defense

Understanding Firewalls: Your First Line of Cyber Defense

1
Comments
12 min read
AWS EC2 IMDS(Instance Metadata Service ) all that you need to know

AWS EC2 IMDS(Instance Metadata Service ) all that you need to know

7
Comments
4 min read
How To Implement AWS SSB Controls in Terraform - Part 3

How To Implement AWS SSB Controls in Terraform - Part 3

3
Comments
15 min read
Understanding Security Group and Network Access Control List (NACL) in AWS

Understanding Security Group and Network Access Control List (NACL) in AWS

11
Comments
3 min read
Sloan's Inbox: Is security still an afterthought?

Sloan's Inbox: Is security still an afterthought?

8
Comments 7
2 min read
Navigating the Realm of Cloud Security on AWS

Navigating the Realm of Cloud Security on AWS

Comments
8 min read
Analysing the Differences between WebSocket and WebRTC

Analysing the Differences between WebSocket and WebRTC

4
Comments
6 min read
Terraform & HashiCorp Vault Integration: Seamless Secrets Management

Terraform & HashiCorp Vault Integration: Seamless Secrets Management

2
Comments
5 min read
Seamless Security: Setting Up Biometric Authentication on Android Emulator & iOS Simulator

Seamless Security: Setting Up Biometric Authentication on Android Emulator & iOS Simulator

16
Comments 2
3 min read
What the heck is SSH

What the heck is SSH

4
Comments
1 min read
Security news weekly round-up - 22nd March 2024

Security news weekly round-up - 22nd March 2024

1
Comments
3 min read
Fundamental Concepts in Secure Environments

Fundamental Concepts in Secure Environments

Comments 1
2 min read
Civo Navigate 2024: Scaling Community And Containers In Austin

Civo Navigate 2024: Scaling Community And Containers In Austin

1
Comments
6 min read
File Injection and Path Traversal vulnerabilities

File Injection and Path Traversal vulnerabilities

1
Comments
4 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
Ask: Static Code Analysis Tools.

Ask: Static Code Analysis Tools.

Comments 2
1 min read
Top Password Managers for 2024

Top Password Managers for 2024

1
Comments
4 min read
Linux Exfiltration

Linux Exfiltration

9
Comments 2
3 min read
Workflow Integration with AI: A Unified Approach to Development

Workflow Integration with AI: A Unified Approach to Development

10
Comments
10 min read
Mastering File Upload Security: DoS and Antivirus

Mastering File Upload Security: DoS and Antivirus

31
Comments
9 min read
Atlassian security incidents: 2023 in Review

Atlassian security incidents: 2023 in Review

Comments
8 min read
6 Tools To Help Keep Your Dependencies And Code More Secure

6 Tools To Help Keep Your Dependencies And Code More Secure

30
Comments 4
8 min read
Adding Clerk Authentication to a NextJS App

Adding Clerk Authentication to a NextJS App

32
Comments 1
4 min read
WebAuthn Cheat Sheet for Developers

WebAuthn Cheat Sheet for Developers

Comments
2 min read
Security in AWS: IAM Best Practices and Advanced Techniques

Security in AWS: IAM Best Practices and Advanced Techniques

11
Comments
13 min read
SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

30
Comments 3
3 min read
What is JWT ?

What is JWT ?

10
Comments
2 min read
Best Practices for Configuring Rate Limits to Prevent DDoS

Best Practices for Configuring Rate Limits to Prevent DDoS

Comments
6 min read
loading...