Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Setting Up SafeLine: Best Practices for Secure Web Traffic

Setting Up SafeLine: Best Practices for Secure Web Traffic

9
Comments
3 min read
Transform Your Server into a High-Security Fortress with SafeLine WAF

Transform Your Server into a High-Security Fortress with SafeLine WAF

5
Comments
2 min read
Practical Example of Escaping XSS Context
Cover image for Practical Example of Escaping XSS Context

Practical Example of Escaping XSS Context

5
Comments 2
4 min read
How Semantic Analysis Works in SafeLine WAF

How Semantic Analysis Works in SafeLine WAF

14
Comments
2 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
Cover image for Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Comments
3 min read
What is a Web Application Gateway

What is a Web Application Gateway

6
Comments
2 min read
Top 10 Web Application Gateways 2025

Top 10 Web Application Gateways 2025

5
Comments
3 min read
A Comprehensive Guide to Understand Penetration Testing

A Comprehensive Guide to Understand Penetration Testing

3
Comments
4 min read
How I Hacked Large Language Models(LLMs) Using Prompt Injection (And It Worked)
Cover image for How I Hacked Large Language Models(LLMs) Using Prompt Injection (And It Worked)

How I Hacked Large Language Models(LLMs) Using Prompt Injection (And It Worked)

2
Comments
5 min read
What are OSI Model and HTTP Request for Beginners

What are OSI Model and HTTP Request for Beginners

13
Comments 4
5 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Beginners' Guide to Understand Web Crawlers and Bots (2)

Beginners' Guide to Understand Web Crawlers and Bots (2)

2
Comments
3 min read
Navigating the Digital Frontier: A Cybersecurity Primer for Business Owners

Navigating the Digital Frontier: A Cybersecurity Primer for Business Owners

Comments
2 min read
Where Should I Start with Cybersecurity

Where Should I Start with Cybersecurity

3
Comments
5 min read
Load Balancing with Reverse Proxy

Load Balancing with Reverse Proxy

2
Comments
3 min read
A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

12
Comments
3 min read
Demystifying XDR for MSPs: A Practical Guide
Cover image for Demystifying XDR for MSPs: A Practical Guide

Demystifying XDR for MSPs: A Practical Guide

Comments
4 min read
TCP/IP Networking Model
Cover image for TCP/IP Networking Model

TCP/IP Networking Model

6
Comments 1
5 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
10 Under-the-Radar Cybersecurity Threats SMBs Face in 2024 (And How to Defend Against Them)
Cover image for 10 Under-the-Radar Cybersecurity Threats SMBs Face in 2024 (And How to Defend Against Them)

10 Under-the-Radar Cybersecurity Threats SMBs Face in 2024 (And How to Defend Against Them)

Comments
2 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

14
Comments 1
1 min read
SafeLine WAF: Network Traffic Scrubbing
Cover image for SafeLine WAF: Network Traffic Scrubbing

SafeLine WAF: Network Traffic Scrubbing

6
Comments
3 min read
Kali Linux for Ethical Hacking: The Ultimate Toolkit for Cybersecurity Professionals

Kali Linux for Ethical Hacking: The Ultimate Toolkit for Cybersecurity Professionals

2
Comments
4 min read
SQLMap Cheat Sheet: A Quick Guide for Automated SQL Injection

SQLMap Cheat Sheet: A Quick Guide for Automated SQL Injection

8
Comments
3 min read
loading...