Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Configure SSL Certificates in Nginx for Secure HTTPS Connections
Cover image for How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

1
Comments
2 min read
Pied Piper a AI Dorker v3.0 - Advanced OSINT Tool for AI Service Security Research
Cover image for Pied Piper a AI Dorker v3.0 - Advanced OSINT Tool for AI Service Security Research

Pied Piper a AI Dorker v3.0 - Advanced OSINT Tool for AI Service Security Research

11
Comments 3
5 min read
Dev Diary #2: Cloud Security plugin for JetBrains IDE
Cover image for Dev Diary #2: Cloud Security plugin for JetBrains IDE

Dev Diary #2: Cloud Security plugin for JetBrains IDE

Comments
3 min read
Revival Hijacking: How Deleted PyPI Packages Become Threats
Cover image for Revival Hijacking: How Deleted PyPI Packages Become Threats

Revival Hijacking: How Deleted PyPI Packages Become Threats

Comments
6 min read
Hackers Plant Covert Malware in Major Telecom Networks
Cover image for Hackers Plant Covert Malware in Major Telecom Networks

Hackers Plant Covert Malware in Major Telecom Networks

1
Comments 1
1 min read
CVE-2021-3156: Sudo Heap-Based Buffer Overflow Vulnerability
Cover image for CVE-2021-3156: Sudo Heap-Based Buffer Overflow Vulnerability

CVE-2021-3156: Sudo Heap-Based Buffer Overflow Vulnerability

1
Comments
1 min read
SC-300 Exam Explained: Complete Guide to Microsoft Identity and Access Administrator
Cover image for SC-300 Exam Explained: Complete Guide to Microsoft Identity and Access Administrator

SC-300 Exam Explained: Complete Guide to Microsoft Identity and Access Administrator

1
Comments 2
4 min read
git-secure: Add authentication prompts before running sensitive Git commands)
Cover image for git-secure: Add authentication prompts before running sensitive Git commands)

git-secure: Add authentication prompts before running sensitive Git commands)

Comments
1 min read
How I Built NetNerve That Made Headlines a Day After It's Launch
Cover image for How I Built NetNerve That Made Headlines a Day After It's Launch

How I Built NetNerve That Made Headlines a Day After It's Launch

2
Comments
2 min read
Network Basics for Security
Cover image for Network Basics for Security

Network Basics for Security

2
Comments
1 min read
How to Avoid False Positives in SafeLine WAF with Custom Rules

How to Avoid False Positives in SafeLine WAF with Custom Rules

5
Comments
3 min read
Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)

Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)

Comments
1 min read
RCE in Apache OFBiz: What Devs Should Know About CVE-2023-49070

RCE in Apache OFBiz: What Devs Should Know About CVE-2023-49070

6
Comments
2 min read
Wazuh 4.12 Telegram Alert Integration (with SSH Login Alerts)
Cover image for Wazuh 4.12 Telegram Alert Integration (with SSH Login Alerts)

Wazuh 4.12 Telegram Alert Integration (with SSH Login Alerts)

6
Comments
5 min read
Honeypot! Analyzing Attacker Behavior via SSH
Cover image for Honeypot! Analyzing Attacker Behavior via SSH

Honeypot! Analyzing Attacker Behavior via SSH

Comments
14 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.