Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Weekly #33-2025:Patch Tuesday, AI & Careers, Core Fundamentals, Cloud Era

Weekly #33-2025:Patch Tuesday, AI & Careers, Core Fundamentals, Cloud Era

Comments 1
5 min read
Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa
Cover image for Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

1
Comments
1 min read
5 Ways IoT Is Changing the Way Vending Machines Work
Cover image for 5 Ways IoT Is Changing the Way Vending Machines Work

5 Ways IoT Is Changing the Way Vending Machines Work

Comments
3 min read
Qu'est-ce qu'une attaque par prompt injection?
Cover image for Qu'est-ce qu'une attaque par prompt injection?

Qu'est-ce qu'une attaque par prompt injection?

2
Comments
1 min read
Choosing the Right Performance Mode in SafeLine

Choosing the Right Performance Mode in SafeLine

5
Comments
1 min read
How I Caught an MPESA API Leak Hiding in Plain Sight

How I Caught an MPESA API Leak Hiding in Plain Sight

2
Comments
2 min read
10 Best Platforms to Learn Cybersecurity Courses in 2025
Cover image for 10 Best Platforms to Learn Cybersecurity Courses in 2025

10 Best Platforms to Learn Cybersecurity Courses in 2025

2
Comments
5 min read
Application Penetration Testing: Why Your Web and Mobile Apps Need a Security Checkup
Cover image for Application Penetration Testing: Why Your Web and Mobile Apps Need a Security Checkup

Application Penetration Testing: Why Your Web and Mobile Apps Need a Security Checkup

1
Comments
2 min read
ICMP Spoofing with Scapy: Responding to Pings as a Fake IP
Cover image for ICMP Spoofing with Scapy: Responding to Pings as a Fake IP

ICMP Spoofing with Scapy: Responding to Pings as a Fake IP

1
Comments
2 min read
AI Powered Honeypot
Cover image for AI Powered Honeypot

AI Powered Honeypot

Comments
2 min read
Host Your Own Web Firewall with SafeLine — No Cloud Needed

Host Your Own Web Firewall with SafeLine — No Cloud Needed

8
Comments
2 min read
Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Comments
4 min read
Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

6
Comments
2 min read
What is Dangling DNS? (And How It Can Lead to Domain Takeovers)
Cover image for What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

2
Comments
2 min read
I got 99 problems, but a breach ain’t one
Cover image for I got 99 problems, but a breach ain’t one

I got 99 problems, but a breach ain’t one

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.