Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Upgraded My Pentesting Toolkit: Introducing 2 Free Web Tools for Infosec 🛡️

I Upgraded My Pentesting Toolkit: Introducing 2 Free Web Tools for Infosec 🛡️

Comments
2 min read
CVE-2026-33017: How I Found an Unauthenticated RCE in Langflow by Reading the Code They Already Fixed

CVE-2026-33017: How I Found an Unauthenticated RCE in Langflow by Reading the Code They Already Fixed

2
Comments
7 min read
Cross-site scripting – Reflected XSS | PortSwigger Lab Note #3

Cross-site scripting – Reflected XSS | PortSwigger Lab Note #3

5
Comments
2 min read
GHSA-46FP-8F5P-PF2M: GHSA-46fp-8f5p-pf2m: XSS Filter Bypass via Improper HTML Entity Decoding in Loofah allowed_uri?

GHSA-46FP-8F5P-PF2M: GHSA-46fp-8f5p-pf2m: XSS Filter Bypass via Improper HTML Entity Decoding in Loofah allowed_uri?

Comments
2 min read
Post-Quantum IPsec Is Finally Becoming Boring — And That’s the Point
Cover image for Post-Quantum IPsec Is Finally Becoming Boring — And That’s the Point

Post-Quantum IPsec Is Finally Becoming Boring — And That’s the Point

1
Comments
3 min read
Web Pentesting Beginner Roadmap (2026): From Recon to Server-Side Attacks
Cover image for Web Pentesting Beginner Roadmap (2026): From Recon to Server-Side Attacks

Web Pentesting Beginner Roadmap (2026): From Recon to Server-Side Attacks

1
Comments
2 min read
How to audit your AWS infrastructure for NIS2 and DORA compliance (practical guide)

How to audit your AWS infrastructure for NIS2 and DORA compliance (practical guide)

Comments
4 min read
CompTIA Security+ SY0-701 5.2 Study Guide: Risk Management and Business Impact Analysis
Cover image for CompTIA Security+ SY0-701 5.2 Study Guide: Risk Management and Business Impact Analysis

CompTIA Security+ SY0-701 5.2 Study Guide: Risk Management and Business Impact Analysis

Comments
4 min read
The FBI's Data Dragnet: How Government Agencies Are Secretly Purchasing Your Digital Footprint Without Warrants

The FBI's Data Dragnet: How Government Agencies Are Secretly Purchasing Your Digital Footprint Without Warrants

Comments
6 min read
Integrating a local mail server into my LDAP lab
Cover image for Integrating a local mail server into my LDAP lab

Integrating a local mail server into my LDAP lab

Comments
6 min read
Cross-site scripting – Stored XSS into anchor href attribute with double quotes HTML-encoded | PortSwigger Lab Note #2

Cross-site scripting – Stored XSS into anchor href attribute with double quotes HTML-encoded | PortSwigger Lab Note #2

Comments
1 min read
Britain's AI Content Labeling Laws: How New Regulations Could Transform Digital Trust and Combat Deepfake Disinformation

Britain's AI Content Labeling Laws: How New Regulations Could Transform Digital Trust and Combat Deepfake Disinformation

Comments
6 min read
What is ModSecurity and How It Works

What is ModSecurity and How It Works

Comments
3 min read
FBI's Data Purchasing Program: How Government Surveillance Bypasses Warrant Requirements in 2024

FBI's Data Purchasing Program: How Government Surveillance Bypasses Warrant Requirements in 2024

Comments
7 min read
MediaTek Audio DSP Vulnerability: How a Nothing Phone Could Have Been Hacked (Except It Wasn't)

MediaTek Audio DSP Vulnerability: How a Nothing Phone Could Have Been Hacked (Except It Wasn't)

Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.