Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
❄️A Five-Minute UI Feature That Became an XSS Time Bomb
Cover image for ❄️A Five-Minute UI Feature That Became an XSS Time Bomb

❄️A Five-Minute UI Feature That Became an XSS Time Bomb

45
Comments 11
4 min read
I built a website security scanner (because I kept shipping insecure projects)

I built a website security scanner (because I kept shipping insecure projects)

Comments
2 min read
Compliance as Code: The Latency Challenge in Fintech Architectures

Compliance as Code: The Latency Challenge in Fintech Architectures

Comments
1 min read
npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

Comments
2 min read
🛡️ Ethical Hacking Lab Walkthrough: Website Cloning & SMB Enumeration (Beginner-Friendly)

🛡️ Ethical Hacking Lab Walkthrough: Website Cloning & SMB Enumeration (Beginner-Friendly)

Comments
4 min read
Praktikum Keamanan Web: Broken Access Control & Insecure Direct Object Reference (IDOR) 😱🔓
Cover image for Praktikum Keamanan Web: Broken Access Control & Insecure Direct Object Reference (IDOR) 😱🔓

Praktikum Keamanan Web: Broken Access Control & Insecure Direct Object Reference (IDOR) 😱🔓

Comments
3 min read
Praktikum Keamanan Web: Mass Assignment Vulnerability 😱🔓
Cover image for Praktikum Keamanan Web: Mass Assignment Vulnerability 😱🔓

Praktikum Keamanan Web: Mass Assignment Vulnerability 😱🔓

Comments
3 min read
Praktikum Keamanan Web: Cross-Site Scripting (XSS) 😱💉
Cover image for Praktikum Keamanan Web: Cross-Site Scripting (XSS) 😱💉

Praktikum Keamanan Web: Cross-Site Scripting (XSS) 😱💉

Comments
3 min read
DVP: Why Your Self-Driving Car Needs an AI Flight Recorder

DVP: Why Your Self-Driving Car Needs an AI Flight Recorder

Comments
9 min read
The Great GCP Identity Crisis: Unraveling Resource Manager Tags vs. Labels

The Great GCP Identity Crisis: Unraveling Resource Manager Tags vs. Labels

1
Comments
8 min read
Instructions for deploying the NIST SP 800-53 Framework on the AWS platform.

Instructions for deploying the NIST SP 800-53 Framework on the AWS platform.

Comments
2 min read
Scripting Challenge Week 1: Port Scanning

Scripting Challenge Week 1: Port Scanning

Comments
12 min read
Praktikum Keamanan Web: Open Redirect Vulnerability 🔀🎣
Cover image for Praktikum Keamanan Web: Open Redirect Vulnerability 🔀🎣

Praktikum Keamanan Web: Open Redirect Vulnerability 🔀🎣

Comments
3 min read
Praktikum Keamanan Web: File Upload Vulnerability 😱📁💥
Cover image for Praktikum Keamanan Web: File Upload Vulnerability 😱📁💥

Praktikum Keamanan Web: File Upload Vulnerability 😱📁💥

Comments
3 min read
How I Built a Security-First SaaS Boilerplate with 100% Test Coverage
Cover image for How I Built a Security-First SaaS Boilerplate with 100% Test Coverage

How I Built a Security-First SaaS Boilerplate with 100% Test Coverage

Comments
4 min read
Pen Testing IoT Devices

Pen Testing IoT Devices

Comments
8 min read
VAP: A Universal Framework for AI Flight Recorders

VAP: A Universal Framework for AI Flight Recorders

Comments
6 min read
Praktikum Keamanan Web: Cross-Site Request Forgery (CSRF) 😱🛡️
Cover image for Praktikum Keamanan Web: Cross-Site Request Forgery (CSRF) 😱🛡️

Praktikum Keamanan Web: Cross-Site Request Forgery (CSRF) 😱🛡️

Comments
3 min read
Key Azure Backup Solutions You Should Know (Azure-Native Only)

Key Azure Backup Solutions You Should Know (Azure-Native Only)

Comments
4 min read
IAP-FIN: Building AI Audit Trails That Actually Satisfy Financial Regulators

IAP-FIN: Building AI Audit Trails That Actually Satisfy Financial Regulators

Comments
10 min read
How a $200 Receiver Led Me Down a Bluetooth Protocol Reverse Engineering Rabbit Hole

How a $200 Receiver Led Me Down a Bluetooth Protocol Reverse Engineering Rabbit Hole

Comments
2 min read
AWS SERVICES SPOTLIGHT : CLOUDHSM (HARDWARD SECURITY MODULE)

AWS SERVICES SPOTLIGHT : CLOUDHSM (HARDWARD SECURITY MODULE)

Comments
1 min read
Container Image Vulnerability Scanning Using Grype
Cover image for Container Image Vulnerability Scanning Using Grype

Container Image Vulnerability Scanning Using Grype

Comments
2 min read
🛡️ Building a CASB‑Like Threat Monitoring Lab in AWS (Beginner Friendly)

🛡️ Building a CASB‑Like Threat Monitoring Lab in AWS (Beginner Friendly)

Comments
5 min read
Praktikum Keamanan Web: Server-Side Request Forgery (SSRF) 🌐🕵️‍♂️
Cover image for Praktikum Keamanan Web: Server-Side Request Forgery (SSRF) 🌐🕵️‍♂️

Praktikum Keamanan Web: Server-Side Request Forgery (SSRF) 🌐🕵️‍♂️

Comments
3 min read
loading...