Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OWASP API7:2023 Server Side Request Forgery(SSRF)
Cover image for OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔
Cover image for OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

4
Comments
3 min read
Feels like I am starting from scratch after a computer science degree.....

Feels like I am starting from scratch after a computer science degree.....

Comments
1 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔
Cover image for OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

7
Comments
4 min read
Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process
Cover image for Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Comments
6 min read
INTRODUCTION TO CYBER SECURITY
Cover image for INTRODUCTION TO CYBER SECURITY

INTRODUCTION TO CYBER SECURITY

Comments
3 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨
Cover image for OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
The Future of Cyber Security: Trends to Watch in 2024
Cover image for The Future of Cyber Security: Trends to Watch in 2024

The Future of Cyber Security: Trends to Watch in 2024

Comments
3 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️
Cover image for OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?
Cover image for Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

7
Comments 4
1 min read
Picked The Red Pill
Cover image for Picked The Red Pill

Picked The Red Pill

Comments
5 min read
Quit Smoking, Start H@ckN!
Cover image for Quit Smoking, Start H@ckN!

Quit Smoking, Start H@ckN!

Comments
3 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔
Cover image for OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

5
Comments
5 min read
GUI vs CLI
Cover image for GUI vs CLI

GUI vs CLI

3
Comments
2 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒
Cover image for Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

7
Comments 3
4 min read
5 platform that pay huge if you're an Ethical H4CK3R
Cover image for 5 platform that pay huge if you're an Ethical H4CK3R

5 platform that pay huge if you're an Ethical H4CK3R

Comments
2 min read
5 platform that pay huge if you're an Ethical H4CK3R
Cover image for 5 platform that pay huge if you're an Ethical H4CK3R

5 platform that pay huge if you're an Ethical H4CK3R

Comments
2 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐
Cover image for Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
🎣 Phishing Websites: When Web Development and Cybersecurity Come Together

🎣 Phishing Websites: When Web Development and Cybersecurity Come Together

Comments
3 min read
What is a Rootkit?
Cover image for What is a Rootkit?

What is a Rootkit?

Comments
2 min read
Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography
Cover image for Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

1
Comments
4 min read
Cross-Device Passkey Sync Between Web, iOS, Android App
Cover image for Cross-Device Passkey Sync Between Web, iOS, Android App

Cross-Device Passkey Sync Between Web, iOS, Android App

5
Comments
2 min read
11 tips to spot Phishing Attack

11 tips to spot Phishing Attack

Comments
5 min read
Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security
Cover image for Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Comments
2 min read
Phishing Attack
Cover image for Phishing Attack

Phishing Attack

1
Comments
2 min read
loading...