Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CEH: Advanced Penetration Testing Guide
Cover image for CEH: Advanced Penetration Testing Guide

CEH: Advanced Penetration Testing Guide

Comments
3 min read
🚀 API Security in 2025: Are Your APIs Safe?

🚀 API Security in 2025: Are Your APIs Safe?

1
Comments 1
1 min read
Exploring the GenAI Red Teaming Guide

Exploring the GenAI Red Teaming Guide

9
Comments 1
2 min read
From Alert to Action: Investigating a Possible Phishing URL
Cover image for From Alert to Action: Investigating a Possible Phishing URL

From Alert to Action: Investigating a Possible Phishing URL

Comments
2 min read
Ransomware: A Wake-Up Call for the Digital Age
Cover image for Ransomware: A Wake-Up Call for the Digital Age

Ransomware: A Wake-Up Call for the Digital Age

Comments 1
4 min read
Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis
Cover image for Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis

Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis

4
Comments
4 min read
Introducing the "WHAT IF" Series: A Deep Dive into the Future of Tech, Cybersecurity, AI, and Hacking
Cover image for Introducing the "WHAT IF" Series: A Deep Dive into the Future of Tech, Cybersecurity, AI, and Hacking

Introducing the "WHAT IF" Series: A Deep Dive into the Future of Tech, Cybersecurity, AI, and Hacking

7
Comments 2
2 min read
What is the NIS 2 Directive?

What is the NIS 2 Directive?

Comments
7 min read
NYP Infosec December CTF 2024 writeup!
Cover image for NYP Infosec December CTF 2024 writeup!

NYP Infosec December CTF 2024 writeup!

1
Comments
3 min read
Command Injection in Laravel: How to Detect & Prevent It
Cover image for Command Injection in Laravel: How to Detect & Prevent It

Command Injection in Laravel: How to Detect & Prevent It

6
Comments
3 min read
Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites
Cover image for Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites

Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites

Comments
3 min read
New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.
Cover image for New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

13
Comments
5 min read
Decompiling and Debugging with Ghidra
Cover image for Decompiling and Debugging with Ghidra

Decompiling and Debugging with Ghidra

13
Comments
4 min read
Conhecendo OSINT
Cover image for Conhecendo OSINT

Conhecendo OSINT

1
Comments
3 min read
Quitting After a Decade In: Lessons I am Carrying Over
Cover image for Quitting After a Decade In: Lessons I am Carrying Over

Quitting After a Decade In: Lessons I am Carrying Over

1
Comments
7 min read
🚨 Advanced SQL Injection: Exploitation Techniques & Prevention Strategies 🚀
Cover image for 🚨 Advanced SQL Injection: Exploitation Techniques & Prevention Strategies 🚀

🚨 Advanced SQL Injection: Exploitation Techniques & Prevention Strategies 🚀

5
Comments
3 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply
Cover image for 🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
Data Protection, Privacy, and Ethics in the Data driven Age
Cover image for Data Protection, Privacy, and Ethics in the Data driven Age

Data Protection, Privacy, and Ethics in the Data driven Age

Comments
3 min read
Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe
Cover image for Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

2
Comments
2 min read
The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance
Cover image for The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance

The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance

Comments
2 min read
Preventing Race Conditions in Laravel Applications
Cover image for Preventing Race Conditions in Laravel Applications

Preventing Race Conditions in Laravel Applications

3
Comments
3 min read
Docker Security: Essential Practices for Securing Your Containers
Cover image for Docker Security: Essential Practices for Securing Your Containers

Docker Security: Essential Practices for Securing Your Containers

4
Comments
3 min read
Some data breach just exposed 50 million students

Some data breach just exposed 50 million students

Comments
2 min read
Introducing AsmJamShield: A Professional-Grade Cybersecurity Tool
Cover image for Introducing AsmJamShield: A Professional-Grade Cybersecurity Tool

Introducing AsmJamShield: A Professional-Grade Cybersecurity Tool

5
Comments
3 min read
What to Expect in 2025?
Cover image for What to Expect in 2025?

What to Expect in 2025?

Comments 1
9 min read
loading...