Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Lazarus Hackers: Everything You Know Is a Lie
Cover image for The Lazarus Hackers: Everything You Know Is a Lie

The Lazarus Hackers: Everything You Know Is a Lie

2
Comments
5 min read
⚠️ If You See an App Created with "Vibe Coding", RUN! ⚠️
Cover image for ⚠️ If You See an App Created with "Vibe Coding", RUN! ⚠️

⚠️ If You See an App Created with "Vibe Coding", RUN! ⚠️

5
Comments 4
2 min read
Montando um laboratório de Pentest com um celular Android e Kali Linux
Cover image for Montando um laboratório de Pentest com um celular Android e Kali Linux

Montando um laboratório de Pentest com um celular Android e Kali Linux

2
Comments
8 min read
Understanding Network Communication: OSI Model vs. TCP/IP Model vs. UDP
Cover image for Understanding Network Communication: OSI Model vs. TCP/IP Model vs. UDP

Understanding Network Communication: OSI Model vs. TCP/IP Model vs. UDP

6
Comments
4 min read
Server NIGHTMARE
Cover image for Server NIGHTMARE

Server NIGHTMARE

6
Comments
5 min read
Salting Passwords: Your First Line of Defense in Cryptography

Salting Passwords: Your First Line of Defense in Cryptography

10
Comments
2 min read
Automatizando Recon com N8N

Automatizando Recon com N8N

8
Comments
5 min read
Mobile App Security Best Practices Every Developer Should Follow

Mobile App Security Best Practices Every Developer Should Follow

1
Comments
3 min read
The History and Impact of Notorious Cyber Attacks
Cover image for The History and Impact of Notorious Cyber Attacks

The History and Impact of Notorious Cyber Attacks

Comments
4 min read
Inside the Hacker Trap: How Honeypots Catch Intruders
Cover image for Inside the Hacker Trap: How Honeypots Catch Intruders

Inside the Hacker Trap: How Honeypots Catch Intruders

10
Comments
3 min read
"Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy
Cover image for "Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy

"Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy

4
Comments 2
5 min read
Exam Prep, a Spark of Curiosity, and a Moonlit Ending

Exam Prep, a Spark of Curiosity, and a Moonlit Ending

1
Comments 1
1 min read
How AI is Revolutionizing Cybersecurity: 10 Ways It’s Changing the Game
Cover image for How AI is Revolutionizing Cybersecurity: 10 Ways It’s Changing the Game

How AI is Revolutionizing Cybersecurity: 10 Ways It’s Changing the Game

1
Comments
3 min read
POC - CVE-2025-29306 FOXCMS /images/index.html Code Execution Vulnerability

POC - CVE-2025-29306 FOXCMS /images/index.html Code Execution Vulnerability

5
Comments
1 min read
POC - Remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code - CVE-2025-3248

POC - Remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code - CVE-2025-3248

5
Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.