Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SafeLine - Secure Your Web Applications

SafeLine - Secure Your Web Applications

10
Comments
2 min read
How to Enhance File Security: Three Key Measures for Your Business
Cover image for How to Enhance File Security: Three Key Measures for Your Business

How to Enhance File Security: Three Key Measures for Your Business

Comments
2 min read
3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple
Cover image for 3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple

3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple

6
Comments
3 min read
How to make “Input validation” easy for your devs

How to make “Input validation” easy for your devs

1
Comments
5 min read
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
Cover image for Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications

Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications

2
Comments
4 min read
Protect Your Web Application: A Tutorial Guide to Using SafeLine WAF
Cover image for Protect Your Web Application: A Tutorial Guide to Using SafeLine WAF

Protect Your Web Application: A Tutorial Guide to Using SafeLine WAF

13
Comments
3 min read
ShellCode 1.0
Cover image for ShellCode 1.0

ShellCode 1.0

1
Comments
3 min read
AI and Cybersecurity: Navigating the Evolving Landscape
Cover image for AI and Cybersecurity: Navigating the Evolving Landscape

AI and Cybersecurity: Navigating the Evolving Landscape

Comments
3 min read
Memory dump analysis

Memory dump analysis

Comments
1 min read
Hunting the Hacker: A Deep Dive into Courier Fraud
Cover image for Hunting the Hacker: A Deep Dive into Courier Fraud

Hunting the Hacker: A Deep Dive into Courier Fraud

10
Comments
2 min read
AWS Security Essentials: From Prevention to Detection
Cover image for AWS Security Essentials: From Prevention to Detection

AWS Security Essentials: From Prevention to Detection

1
Comments
4 min read
When Bad Code Crashes a Billion Windows Computers 🚨
Cover image for When Bad Code Crashes a Billion Windows Computers 🚨

When Bad Code Crashes a Billion Windows Computers 🚨

34
Comments 29
4 min read
Secure and Resilient Design
Cover image for Secure and Resilient Design

Secure and Resilient Design

2
Comments
16 min read
Recommended free and open-source WAF for 2024.

Recommended free and open-source WAF for 2024.

20
Comments
3 min read
SafeLine Community Edition releases dynamic protection capabilities.

SafeLine Community Edition releases dynamic protection capabilities.

9
Comments
3 min read
Top Cybersecurity Best Practices for Businesses
Cover image for Top Cybersecurity Best Practices for Businesses

Top Cybersecurity Best Practices for Businesses

Comments
3 min read
API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite
Cover image for API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite

API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite

1
Comments
5 min read
The Importance of Guardrails in LLMs, AAAL Pt. 2
Cover image for The Importance of Guardrails in LLMs, AAAL Pt. 2

The Importance of Guardrails in LLMs, AAAL Pt. 2

9
Comments
2 min read
A little whiff of Cybersecurity
Cover image for A little whiff of Cybersecurity

A little whiff of Cybersecurity

3
Comments 2
5 min read
Nuvem Pública, Privada e Híbrida: O que é cada uma?

Nuvem Pública, Privada e Híbrida: O que é cada uma?

3
Comments
3 min read
SCA vs SAST - Security Tools Comparison 🛡️
Cover image for SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

3
Comments
6 min read
Security Meetup
Cover image for Security Meetup

Security Meetup

Comments
1 min read
Integration of Artificial Intelligence and Machine Learning in Cloud Security

Integration of Artificial Intelligence and Machine Learning in Cloud Security

2
Comments
5 min read
Understanding Adversarial Attacks on LLMs, AAAL Pt.1
Cover image for Understanding Adversarial Attacks on LLMs, AAAL Pt.1

Understanding Adversarial Attacks on LLMs, AAAL Pt.1

6
Comments
2 min read
SafeLine: An open-source web application firewall that provides security at no cost.

SafeLine: An open-source web application firewall that provides security at no cost.

15
Comments
4 min read
loading...