Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

Comments
1 min read
CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

Comments
2 min read
Why I Built a Black Box for AI Agents

Why I Built a Black Box for AI Agents

Comments
2 min read
# How I Built a Live Cybersecurity Intelligence Dashboard on a Raspberry Pi 5
Cover image for # How I Built a Live Cybersecurity Intelligence Dashboard on a Raspberry Pi 5

# How I Built a Live Cybersecurity Intelligence Dashboard on a Raspberry Pi 5

Comments
5 min read
CVE-2026-27739: Angular SSR: When 'Helpful' Headers Become Server-Side Sabotage

CVE-2026-27739: Angular SSR: When 'Helpful' Headers Become Server-Side Sabotage

Comments
2 min read
CVE-2026-27577: n8n RCE: When 'Do Not Enter' is Just a Suggestion

CVE-2026-27577: n8n RCE: When 'Do Not Enter' is Just a Suggestion

Comments
2 min read
That GitHub Repo Could Be a Backdoor — How Attackers Target Developers Through Fake Projects

That GitHub Repo Could Be a Backdoor — How Attackers Target Developers Through Fake Projects

Comments
3 min read
The Thieves Who Caught the Thieves
Cover image for The Thieves Who Caught the Thieves

The Thieves Who Caught the Thieves

Comments
9 min read
Lazarus Group Medusa Ransomware: APT38 Multi-Stage Attack Chain
Cover image for Lazarus Group Medusa Ransomware: APT38 Multi-Stage Attack Chain

Lazarus Group Medusa Ransomware: APT38 Multi-Stage Attack Chain

Comments
5 min read
Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)
Cover image for Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

Comments
3 min read
CVE-2026-27628: The Ouroboros Document: Infinite Loops in pypdf

CVE-2026-27628: The Ouroboros Document: Infinite Loops in pypdf

Comments
2 min read
How "Login with Google" Can Be Hacked — OAuth Attacks Explained

How "Login with Google" Can Be Hacked — OAuth Attacks Explained

Comments
4 min read
5 Ways Attackers Bypass Your 2FA — And How to Stop Them

5 Ways Attackers Bypass Your 2FA — And How to Stop Them

Comments
4 min read
Pourquoi les filtres anti-insultes ne suffisent pas pour protéger une communauté

Pourquoi les filtres anti-insultes ne suffisent pas pour protéger une communauté

1
Comments
1 min read
How I Built a Live Cybersecurity Intelligence Dashboard on a Raspberry Pi 5

How I Built a Live Cybersecurity Intelligence Dashboard on a Raspberry Pi 5

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.