Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Completed Cisco’s Networking Basics Course! Here’s Why It Matters
Cover image for I Completed Cisco’s Networking Basics Course! Here’s Why It Matters

I Completed Cisco’s Networking Basics Course! Here’s Why It Matters

1
Comments
1 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Six Hat Analysis for Personal Data Security

Six Hat Analysis for Personal Data Security

1
Comments
4 min read
CVE-2025-53770: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability
Cover image for CVE-2025-53770: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability

CVE-2025-53770: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability

1
Comments
2 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
Claude, OpenAI, Google API Keys... All Public. This Is What I Found After Scanning GitHub at Scale
Cover image for Claude, OpenAI, Google API Keys... All Public. This Is What I Found After Scanning GitHub at Scale

Claude, OpenAI, Google API Keys... All Public. This Is What I Found After Scanning GitHub at Scale

1
Comments 1
2 min read
Apache Tomcat RCE on Windows (CVE-2024-50379): Patch Now or Risk Remote Attacks

Apache Tomcat RCE on Windows (CVE-2024-50379): Patch Now or Risk Remote Attacks

6
Comments
3 min read
Who benefits from attack surface & risk management?

Who benefits from attack surface & risk management?

1
Comments
1 min read
Critical NVIDIA Flaw Exposes AI Cloud Services
Cover image for Critical NVIDIA Flaw Exposes AI Cloud Services

Critical NVIDIA Flaw Exposes AI Cloud Services

1
Comments
1 min read
How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)
Cover image for How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

10
Comments 2
6 min read
PCI DSS Compliance for SSDs: SSL/TLS Requirements & Best Practices

PCI DSS Compliance for SSDs: SSL/TLS Requirements & Best Practices

1
Comments
4 min read
WebSocket Vulnerabilities in Symfony: How to Detect & Fix
Cover image for WebSocket Vulnerabilities in Symfony: How to Detect & Fix

WebSocket Vulnerabilities in Symfony: How to Detect & Fix

3
Comments
3 min read
CVE-2025-31161: CrushFTP Authentication Bypass Vulnerability
Cover image for CVE-2025-31161: CrushFTP Authentication Bypass Vulnerability

CVE-2025-31161: CrushFTP Authentication Bypass Vulnerability

2
Comments
1 min read
CVE-2024-4040: CrushFTP VFS Sandbox Escape Vulnerability
Cover image for CVE-2024-4040: CrushFTP VFS Sandbox Escape Vulnerability

CVE-2024-4040: CrushFTP VFS Sandbox Escape Vulnerability

1
Comments
1 min read
Africa’s Tech Boom Needs a Security Backbone — Not Just AI Hype
Cover image for Africa’s Tech Boom Needs a Security Backbone — Not Just AI Hype

Africa’s Tech Boom Needs a Security Backbone — Not Just AI Hype

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.