Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet
Cover image for Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet

Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet

47
Comments
5 min read
SOC 2 vs. ISO 27001: Which Matters More for Legal Practices and Building Client Trust

SOC 2 vs. ISO 27001: Which Matters More for Legal Practices and Building Client Trust

Comments
4 min read
Guest Post Collaboration: Let’s Exchange Articles & Grow Together!
Cover image for Guest Post Collaboration: Let’s Exchange Articles & Grow Together!

Guest Post Collaboration: Let’s Exchange Articles & Grow Together!

5
Comments 9
2 min read
Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Comments
4 min read
Building Centurion, a Windows cybersecurity tool to fight phishing, malware & C2 traffic
Cover image for Building Centurion, a Windows cybersecurity tool to fight phishing, malware & C2 traffic

Building Centurion, a Windows cybersecurity tool to fight phishing, malware & C2 traffic

1
Comments
2 min read
🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)
Cover image for 🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)

🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)

1
Comments
1 min read
How I Built a Web Vulnerabilty Scanner - OpenEye
Cover image for How I Built a Web Vulnerabilty Scanner - OpenEye

How I Built a Web Vulnerabilty Scanner - OpenEye

6
Comments
7 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

1
Comments
2 min read
What is DNS and how does it work
Cover image for What is DNS and how does it work

What is DNS and how does it work

Comments
3 min read
Wuzen 2025 Analysis: The Android RAT That's Raising the Bar for Mobile Security Threats
Cover image for Wuzen 2025 Analysis: The Android RAT That's Raising the Bar for Mobile Security Threats

Wuzen 2025 Analysis: The Android RAT That's Raising the Bar for Mobile Security Threats

3
Comments
2 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works
Cover image for VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

2
Comments 1
11 min read
🌐 The Digital Legacy — Your Everlasting Legacy
Cover image for 🌐 The Digital Legacy — Your Everlasting Legacy

🌐 The Digital Legacy — Your Everlasting Legacy

Comments 1
3 min read
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity

Understanding Hashing: The Backbone of Data Integrity in Cybersecurity

Comments
4 min read
Penetration Testing vs. Red Teaming

Penetration Testing vs. Red Teaming

1
Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.