Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How a Growing Web Platform Defeated CC Attacks with Semantic Analysis WAF

How a Growing Web Platform Defeated CC Attacks with Semantic Analysis WAF

Comments
3 min read
How One Team Finally Stopped Application-Layer Attacks with Semantic Analysis

How One Team Finally Stopped Application-Layer Attacks with Semantic Analysis

Comments
3 min read
How Shadow IT Turns Employees Into Unintentional Insider Threats
Cover image for How Shadow IT Turns Employees Into Unintentional Insider Threats

How Shadow IT Turns Employees Into Unintentional Insider Threats

Comments
5 min read
Implementing Container Signing in Your CI/CD Pipeline: A DevSecOps Approach with AWS
Cover image for Implementing Container Signing in Your CI/CD Pipeline: A DevSecOps Approach with AWS

Implementing Container Signing in Your CI/CD Pipeline: A DevSecOps Approach with AWS

Comments
7 min read
A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)
Cover image for A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)

A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)

Comments
3 min read
Making Linux Work as a Corporate Desktop
Cover image for Making Linux Work as a Corporate Desktop

Making Linux Work as a Corporate Desktop

2
Comments
2 min read
How to Put an End to CC Attacks

How to Put an End to CC Attacks

Comments
4 min read
How SafeLine WAF Protected a Growing Business from Advanced Cybersecurity Threats

How SafeLine WAF Protected a Growing Business from Advanced Cybersecurity Threats

5
Comments 1
5 min read
The Open Book of Active Directory: Leveraging (and Securing) LDAP Queries
Cover image for The Open Book of Active Directory: Leveraging (and Securing) LDAP Queries

The Open Book of Active Directory: Leveraging (and Securing) LDAP Queries

2
Comments 1
3 min read
Cybersecurity ProxyChains: A Mask of Anonymity

Cybersecurity ProxyChains: A Mask of Anonymity

1
Comments
3 min read
How to Tell if a YouTube Video is a Scam in 2026: The Complete Guide
Cover image for How to Tell if a YouTube Video is a Scam in 2026: The Complete Guide

How to Tell if a YouTube Video is a Scam in 2026: The Complete Guide

1
Comments
11 min read
Microsoft Cloud Adoption Framework
Cover image for Microsoft Cloud Adoption Framework

Microsoft Cloud Adoption Framework

Comments
1 min read
Instagram Data Breach: Unpacking the Exposure of 17.5 Million Users
Cover image for Instagram Data Breach: Unpacking the Exposure of 17.5 Million Users

Instagram Data Breach: Unpacking the Exposure of 17.5 Million Users

5
Comments 1
4 min read
How we made email authentication actually usable inside editors and AI agents
Cover image for How we made email authentication actually usable inside editors and AI agents

How we made email authentication actually usable inside editors and AI agents

1
Comments
2 min read
What Kind of Customer Data Do Companies Capture?

What Kind of Customer Data Do Companies Capture?

Comments
5 min read
Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Comments
3 min read
Ultimate Container Security Series

Ultimate Container Security Series

Comments
2 min read
DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime
Cover image for DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime

DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime

99
Comments 25
11 min read
Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Comments
3 min read
Identity Alone Fails in Autonomous Systems

Identity Alone Fails in Autonomous Systems

Comments
1 min read
Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself
Cover image for Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself

Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself

2
Comments
9 min read
I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

Comments
2 min read
Blind Indexing — A Arte de Buscar o que Você Não Pode Ler

Blind Indexing — A Arte de Buscar o que Você Não Pode Ler

Comments
6 min read
When Time Becomes a Security Boundary in AI Systems

When Time Becomes a Security Boundary in AI Systems

Comments
2 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework
Cover image for Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
loading...