Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
!!!!!! Critical React2Shell Vulnerability Exposes Millions of Web Apps to Remote Takeover !!!!!!

!!!!!! Critical React2Shell Vulnerability Exposes Millions of Web Apps to Remote Takeover !!!!!!

8
Comments 1
3 min read
From Beginner to Cyber-Aware: Lessons from My First Cybersecurity Course

From Beginner to Cyber-Aware: Lessons from My First Cybersecurity Course

2
Comments
4 min read
I Built NimPacket, a Raw Packet Crafting Library in Nim, and It Turned Into One of My Best Cyber Projects
Cover image for I Built NimPacket, a Raw Packet Crafting Library in Nim, and It Turned Into One of My Best Cyber Projects

I Built NimPacket, a Raw Packet Crafting Library in Nim, and It Turned Into One of My Best Cyber Projects

1
Comments
2 min read
🛡️Penetration Testing Services Agreement (Beginner-Friendly Guide + Open Template)

🛡️Penetration Testing Services Agreement (Beginner-Friendly Guide + Open Template)

3
Comments
4 min read
Enter RE_VAULT and Try Your Hand at Black Cipher
Cover image for Enter RE_VAULT and Try Your Hand at Black Cipher

Enter RE_VAULT and Try Your Hand at Black Cipher

1
Comments
6 min read
Staged vs. Non Staged Payloads

Staged vs. Non Staged Payloads

Comments
3 min read
Understanding Hashing, Encryption, and Encoding (Simple Overview)
Cover image for Understanding Hashing, Encryption, and Encoding (Simple Overview)

Understanding Hashing, Encryption, and Encoding (Simple Overview)

3
Comments
3 min read
The Cost of a Cloud Breach for a Mid-Sized Law Firm: Risks & Solutions

The Cost of a Cloud Breach for a Mid-Sized Law Firm: Risks & Solutions

Comments
5 min read
Bypassing Web Application Firewalls

Bypassing Web Application Firewalls

2
Comments
5 min read
A Deep Cybersecurity View of Hashing

A Deep Cybersecurity View of Hashing

Comments
3 min read
Kubernetes-Style Scan Scheduling Comes to Security Tools (JMo Security v0.8.0)
Cover image for Kubernetes-Style Scan Scheduling Comes to Security Tools (JMo Security v0.8.0)

Kubernetes-Style Scan Scheduling Comes to Security Tools (JMo Security v0.8.0)

1
Comments 1
6 min read
How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats
Cover image for How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

Comments
5 min read
I built a beginner-friendly reverse engineering challenge using Ghidra
Cover image for I built a beginner-friendly reverse engineering challenge using Ghidra

I built a beginner-friendly reverse engineering challenge using Ghidra

Comments 3
3 min read
The Silent Breach: Why SaaS Security Fails Between Release

The Silent Breach: Why SaaS Security Fails Between Release

2
Comments
2 min read
Authorization for MCP: OAuth 2.1, PRMs, and Best Practices

Authorization for MCP: OAuth 2.1, PRMs, and Best Practices

1
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.