Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Subnetting Basics Guide
Cover image for Subnetting Basics Guide

Subnetting Basics Guide

6
Comments
3 min read
How Infrastructure Monitoring Can Prevent a Cyber Attack
Cover image for How Infrastructure Monitoring Can Prevent a Cyber Attack

How Infrastructure Monitoring Can Prevent a Cyber Attack

1
Comments
4 min read
Is this thing on?
Cover image for Is this thing on?

Is this thing on?

Comments
1 min read
Hack The Box Writeup: Heist
Cover image for Hack The Box Writeup: Heist

Hack The Box Writeup: Heist

Comments
13 min read
Sage Hosting vs On-Premises: A Data-Driven Analysis
Cover image for Sage Hosting vs On-Premises: A Data-Driven Analysis

Sage Hosting vs On-Premises: A Data-Driven Analysis

Comments
4 min read
Unlock the Ultimate Free WAF: Secure Your Site Like a Pro

Unlock the Ultimate Free WAF: Secure Your Site Like a Pro

1
Comments
4 min read
Strengthen Your Web Security with SafeLine WAF on CentOS7

Strengthen Your Web Security with SafeLine WAF on CentOS7

7
Comments
3 min read
Understanding IP Address Types, Subnets, and Loopback

Understanding IP Address Types, Subnets, and Loopback

3
Comments 1
2 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis
Cover image for OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
Determine the type of attack
Cover image for Determine the type of attack

Determine the type of attack

1
Comments 1
2 min read
Using LLMs For Kubernetes: Enter k8sgpt

Using LLMs For Kubernetes: Enter k8sgpt

46
Comments
4 min read
Robots and CAPTCHA: Why AI Can’t Click ‘I’m Not a Robot’ on Websites
Cover image for Robots and CAPTCHA: Why AI Can’t Click ‘I’m Not a Robot’ on Websites

Robots and CAPTCHA: Why AI Can’t Click ‘I’m Not a Robot’ on Websites

2
Comments
4 min read
Securing Your Data: How to Safely Back Up a Single File on Bitbucket
Cover image for Securing Your Data: How to Safely Back Up a Single File on Bitbucket

Securing Your Data: How to Safely Back Up a Single File on Bitbucket

1
Comments
6 min read
Crypto Authentication with Passkeys (Smart Wallets)
Cover image for Crypto Authentication with Passkeys (Smart Wallets)

Crypto Authentication with Passkeys (Smart Wallets)

2
Comments 2
3 min read
Guarding Your APIs: Mastering WAF and API Gateway Integration

Guarding Your APIs: Mastering WAF and API Gateway Integration

17
Comments
3 min read
Boost Kubernetes Security: Deploying SafeLine WAF with Ingress-nginx

Boost Kubernetes Security: Deploying SafeLine WAF with Ingress-nginx

16
Comments 1
3 min read
User Agent Reduction in Chrome, Safari & Firefox
Cover image for User Agent Reduction in Chrome, Safari & Firefox

User Agent Reduction in Chrome, Safari & Firefox

8
Comments 2
3 min read
What is Secrets Scanning? How to Protect Your Application Data
Cover image for What is Secrets Scanning? How to Protect Your Application Data

What is Secrets Scanning? How to Protect Your Application Data

5
Comments
8 min read
Common Ports and Protocols
Cover image for Common Ports and Protocols

Common Ports and Protocols

44
Comments 2
3 min read
Jr Penetration Tester- Content Discovery- robots.txt

Jr Penetration Tester- Content Discovery- robots.txt

1
Comments
1 min read
Exploits Ep - 1: From Prototype Pollution to a 100% Discount
Cover image for Exploits Ep - 1: From Prototype Pollution to a 100% Discount

Exploits Ep - 1: From Prototype Pollution to a 100% Discount

72
Comments 13
10 min read
Why Python Is Good For Cybersecurity

Why Python Is Good For Cybersecurity

11
Comments 2
4 min read
I lost $93 while testing the newly released Open AI vision

I lost $93 while testing the newly released Open AI vision

Comments
3 min read
Comprehensive Guide to Vulnerability Assessment: Part 1

Comprehensive Guide to Vulnerability Assessment: Part 1

Comments
3 min read
Mastering Cybersecurity: Your Gateway to a Safer Digital World 🔒
Cover image for Mastering Cybersecurity: Your Gateway to a Safer Digital World 🔒

Mastering Cybersecurity: Your Gateway to a Safer Digital World 🔒

Comments
4 min read
loading...