loading...
👋 Sign in for the ability sort posts by top and latest.

6 essential tools you should know before launching your website

Reactions 354 Comments 7
2 min read

Applying the Well-Architected Framework, Small Edition

Reactions 203 Comments 14
13 min read

Protecting images on your website

Reactions 163 Comments 23
2 min read

Secure your Data API from Web Scrapers

Reactions 127 Comments 10
5 min read

6 Password Security Risks and How to Avoid Them

Reactions 100 Comments 4
9 min read

Look mom, I'm a GitHub Action Hero

Reactions 77 Comments 2
4 min read

Why anti-encryption laws are crazy

Reactions 66 Comments 8
4 min read

Be anonymous, create your own proxy server with AWS EC2

Reactions 63 Comments 13
4 min read

Bad Security habits to lose

Reactions 61 Comments 4
3 min read

#discussIs Zoom doomed?

Reactions 59 Comments 35
1 min read

#newsAmerican Communications Companies Appear to Be Under DDoS Attack

Reactions 56 Comments 14
1 min read

Add Google Login to your React Apps in 10 mins

Reactions 54
4 min read

Make yourself rich by hacking this juice shop 💵

Reactions 43
3 min read

How to Design a Permissions Framework

Reactions 42
11 min read

Client Certificate vs Server Certificate

Reactions 40
3 min read

Passwords

Reactions 36 Comments 7
8 min read

Ciphers and Hashes Explained

Reactions 33
6 min read

FREE 5-day Angular Security Mini-Academy

Reactions 32
1 min read

#showdevZooming in on Zoom

Reactions 31
3 min read

7 Types of Malware Attacks and How to Prevent Them

Reactions 29
8 min read

Accidentally a hacker

Reactions 27 Comments 2
10 min read

Pre-Launch Android App Security Checklist

Reactions 27 Comments 2
6 min read

CORS : Understanding Cross Origin Resource Sharing

Reactions 26
7 min read

'X-Forwarded-For' or How To restrict access to your Apache when using Cloudflare

Reactions 23 Comments 4
4 min read

Create your own CAPTCHA - part 4 - Algorithm, Node, TypeScript & React

Reactions 23
10 min read

Day-9: Bash Scripting - #1

Reactions 23
2 min read

Trapping Hackers with Containerized Deception

Reactions 22
15 min read

Why Not to Use Root User?

Reactions 22 Comments 2
1 min read

Apache Web Server Hardening

Reactions 22
2 min read

CSRF attack

Reactions 21
1 min read

How to Think About JavaScript Security

Reactions 19
3 min read

What You Need to Know About Cyber Security in the Cloud

Reactions 17
6 min read

How to 'Not Advertise' Your API Key in React Apps

Reactions 16 Comments 9
2 min read

Azure Event Hubs "Role Based Access Control" in action

Reactions 14
7 min read

#todayilearnedWeb Sockets Everywhere!

Reactions 12
3 min read

Server Security For Beginners Pt. 1

Reactions 11
1 min read

Checklist for DevSecOps

Reactions 11
2 min read

AzureFunBytes - AZ-900 Stream, Network Security Groups, SSH Keys, Linux VMs, and your questions.

Reactions 11
1 min read

#discussHow's modern encryption like?

Reactions 11 Comments 2
2 min read

JavaScript Security Pitfalls

Reactions 10 Comments 2
2 min read

#techtalksNETWORK SECURITY- TERMINOLOGY

Reactions 10 Comments 2
3 min read

How to choose the right API Gateway auth method

Reactions 10
3 min read

Using a Reverse Proxy to Protect Third Party APIs

Reactions 9
7 min read

Active Admin 2FA with OneLogin

Reactions 9
5 min read

Make use of your Github Actions minutes for security checking Rails PRs

Reactions 9 Comments 1
2 min read

Day-1: Understanding Base64

Reactions 9 Comments 1
2 min read

OWASP Top 10 Mobile Vulnerabilities Developers Need to Understand

Reactions 9
6 min read

Someone is watching you over the Internet. Protect and Fight Back - Man in the Middle

Reactions 9
8 min read

Hardening your server security with Fail2Ban

Reactions 9
6 min read

Dynamic SSL Pinning on iOS with Approov

Reactions 9
6 min read

Hardening Server Security By Implementing Security Headers

Reactions 9
2 min read

DevSecOps - Mass Assignment

Reactions 8
6 min read

✨How to Run Secure Search over Encrypted Data

Reactions 8
4 min read

White Box and Black Box Testing: Outlining the Difference Between Them

Reactions 8
7 min read

Day-7: Nmap -- Hacker's Favourite Scanning Tool!

Reactions 8 Comments 2
2 min read

Day-4: WebSocket! Wait, what???

Reactions 8
2 min read

Kubernetes Authentication

Reactions 8
5 min read

Express-session vs SuperTokens for handling user sessions

Reactions 8
11 min read

What is the CORS?

Reactions 8
1 min read

#watercoolerLook for Nuke Launchers in Haskell

Reactions 7
1 min read
loading...