Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding SSH and Reverse SSH: A Guide for Beginners
Cover image for Understanding SSH and Reverse SSH: A Guide for Beginners

Understanding SSH and Reverse SSH: A Guide for Beginners

4
Comments
3 min read
Preventing File Inclusion Vulnerabilities in Laravel Applications
Cover image for Preventing File Inclusion Vulnerabilities in Laravel Applications

Preventing File Inclusion Vulnerabilities in Laravel Applications

2
Comments 1
2 min read
Prevent SSRF in Laravel: Guide & Example Code
Cover image for Prevent SSRF in Laravel: Guide & Example Code

Prevent SSRF in Laravel: Guide & Example Code

1
Comments
3 min read
Understanding Zero-Trust Architecture (ZTA)
Cover image for Understanding Zero-Trust Architecture (ZTA)

Understanding Zero-Trust Architecture (ZTA)

5
Comments
4 min read
Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis
Cover image for Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

Comments
2 min read
Advanced WAF Not Fully Based on Rules or Signatures

Advanced WAF Not Fully Based on Rules or Signatures

6
Comments
2 min read
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.
Cover image for Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

10
Comments
4 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies
Cover image for Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

10
Comments
4 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned
Cover image for Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques
Cover image for Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

11
Comments
5 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities
Cover image for Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

10
Comments
4 min read
End Of Series: Mastering Cross-Site Scripting (XSS)
Cover image for End Of Series: Mastering Cross-Site Scripting (XSS)

End Of Series: Mastering Cross-Site Scripting (XSS)

10
Comments
1 min read
Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It
Cover image for Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

11
Comments
4 min read
How to Configure and Get Source IP in SafeLine WAF

How to Configure and Get Source IP in SafeLine WAF

6
Comments
2 min read
Transformation numérique, quel impact sur la sécurité des entreprises ?
Cover image for Transformation numérique, quel impact sur la sécurité des entreprises ?

Transformation numérique, quel impact sur la sécurité des entreprises ?

7
Comments
12 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.