Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
# How to Investigate a Compromised Linux Server
Cover image for # How to Investigate a Compromised Linux Server

# How to Investigate a Compromised Linux Server

11
Comments
12 min read
AI Can "Guess" Base64 Encoding - And That Changes Everything

AI Can "Guess" Base64 Encoding - And That Changes Everything

19
Comments 31
3 min read
Tech Debt Is Real: The Internet Runs on 30-Year-Old Code
Cover image for Tech Debt Is Real: The Internet Runs on 30-Year-Old Code

Tech Debt Is Real: The Internet Runs on 30-Year-Old Code

Comments 1
4 min read
A Complete Overview of Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)

A Complete Overview of Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)

1
Comments 2
11 min read
🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL
Cover image for 🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL

🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL

Comments
3 min read
Recovering a Flag from an RDP Cache

Recovering a Flag from an RDP Cache

1
Comments
3 min read
ModSecurity vs SafeLine: Why Not Use Both? (Part 1)

ModSecurity vs SafeLine: Why Not Use Both? (Part 1)

6
Comments
5 min read
Top-tier hacker groups don’t steal — they earn from the CFO

Top-tier hacker groups don’t steal — they earn from the CFO

1
Comments
5 min read
Resillion — when those who preach cybersecurity forget to practice it

Resillion — when those who preach cybersecurity forget to practice it

1
Comments
5 min read
Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)
Cover image for Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)

Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)

2
Comments
3 min read
SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?
Cover image for SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?

SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?

1
Comments
3 min read
Interview With Author Ahmed Awad ( NullC0d3 )

Interview With Author Ahmed Awad ( NullC0d3 )

1
Comments
3 min read
Think Like a Threat: How SOC Teams Can Stop Attacks Before the First Alert
Cover image for Think Like a Threat: How SOC Teams Can Stop Attacks Before the First Alert

Think Like a Threat: How SOC Teams Can Stop Attacks Before the First Alert

Comments 2
2 min read
🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

1
Comments
1 min read
How I Hack a Hacker
Cover image for How I Hack a Hacker

How I Hack a Hacker

13
Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.