Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SafeLine: A Modern, Developer-Friendly Self-Hosted WAF for Real-World Threats

SafeLine: A Modern, Developer-Friendly Self-Hosted WAF for Real-World Threats

5
Comments
4 min read
Fraud Detection with Knowledge Graphs: A Protégé and VidyaAstra Approach

Fraud Detection with Knowledge Graphs: A Protégé and VidyaAstra Approach

Comments
16 min read
🔍 November: Strengthening Identity & Access Management (IAM) for SMBs
Cover image for 🔍 November: Strengthening Identity & Access Management (IAM) for SMBs

🔍 November: Strengthening Identity & Access Management (IAM) for SMBs

Comments
2 min read
SafeLine: A Modern Take on Self-Hosted Web Application Security

SafeLine: A Modern Take on Self-Hosted Web Application Security

Comments
4 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift
Cover image for The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

Comments
2 min read
Red Queen Hypothesis and The Crescendo Jailbreak Attack Explained

Red Queen Hypothesis and The Crescendo Jailbreak Attack Explained

Comments
3 min read
Securing Cross-Border E-Commerce with SafeLine: A Case Study of Protecting an Independent Online Store

Securing Cross-Border E-Commerce with SafeLine: A Case Study of Protecting an Independent Online Store

Comments
5 min read
Advent of Cyber 2025: Day 8 & 9 Writeup Prompt Injection | TryHackMe
Cover image for Advent of Cyber 2025: Day 8 & 9 Writeup Prompt Injection | TryHackMe

Advent of Cyber 2025: Day 8 & 9 Writeup Prompt Injection | TryHackMe

Comments
2 min read
How I Protect My Website From Real Attacks With SafeLine WAF

How I Protect My Website From Real Attacks With SafeLine WAF

Comments
4 min read
SafeLine: The Open-Source WAF That Holds the Line Until Your Code is Ready

SafeLine: The Open-Source WAF That Holds the Line Until Your Code is Ready

Comments
4 min read
The Future of Private AI: Secure, Cost‑Effective Small Language Models (SLMs) for Domain‑Specific Environments
Cover image for The Future of Private AI: Secure, Cost‑Effective Small Language Models (SLMs) for Domain‑Specific Environments

The Future of Private AI: Secure, Cost‑Effective Small Language Models (SLMs) for Domain‑Specific Environments

27
Comments 2
5 min read
ISO 27001 in 6 Months

ISO 27001 in 6 Months

Comments
4 min read
Hello dev.to! I’m Sergey — developer of Suri Oculus

Hello dev.to! I’m Sergey — developer of Suri Oculus

Comments
1 min read
Social Engineering: Why Humans Are the Weakest Link in Cybersecurity
Cover image for Social Engineering: Why Humans Are the Weakest Link in Cybersecurity

Social Engineering: Why Humans Are the Weakest Link in Cybersecurity

Comments
6 min read
Building a Home SOC Lab

Building a Home SOC Lab

Comments
2 min read
Hacking Ético

Hacking Ético

Comments
1 min read
Machine Learning vs. Cyber Threats: A Smarter Defense
Cover image for Machine Learning vs. Cyber Threats: A Smarter Defense

Machine Learning vs. Cyber Threats: A Smarter Defense

Comments 3
6 min read
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

1
Comments
7 min read
🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

Comments
1 min read
Prompt Injection: What Security Managers Need to Know

Prompt Injection: What Security Managers Need to Know

Comments
15 min read
Raising Privacy-Smart Kids In An Always-Online World
Cover image for Raising Privacy-Smart Kids In An Always-Online World

Raising Privacy-Smart Kids In An Always-Online World

1
Comments
3 min read
The Complete Guide to Security Operations Centers (SOC) in 2025: Importance, Benefits & How SOC Protects Modern Businesses
Cover image for The Complete Guide to Security Operations Centers (SOC) in 2025: Importance, Benefits & How SOC Protects Modern Businesses

The Complete Guide to Security Operations Centers (SOC) in 2025: Importance, Benefits & How SOC Protects Modern Businesses

Comments
5 min read
A Beginner’s Guide to Web Security: Building a Basic Protection System on Nginx with a Free Tool

A Beginner’s Guide to Web Security: Building a Basic Protection System on Nginx with a Free Tool

Comments
4 min read
The Real Cost Of Letting AI Do Your Thinking For You
Cover image for The Real Cost Of Letting AI Do Your Thinking For You

The Real Cost Of Letting AI Do Your Thinking For You

2
Comments 1
3 min read
The Growing Crisis of Burnout Among Cybersecurity Professionals
Cover image for The Growing Crisis of Burnout Among Cybersecurity Professionals

The Growing Crisis of Burnout Among Cybersecurity Professionals

Comments
5 min read
loading...