Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
LoongCollector Security Log Ingestion Practice: Standardized Log Collection for Enterprise Firewall Scenarios

LoongCollector Security Log Ingestion Practice: Standardized Log Collection for Enterprise Firewall Scenarios

Comments
10 min read
Are Cybersecurity Jobs Safe from AI?
Cover image for Are Cybersecurity Jobs Safe from AI?

Are Cybersecurity Jobs Safe from AI?

2
Comments
5 min read
Cómo implementar AWS Network Firewall en una arquitectura multicuenta utilizando Transit Gateway
Cover image for Cómo implementar AWS Network Firewall en una arquitectura multicuenta utilizando Transit Gateway

Cómo implementar AWS Network Firewall en una arquitectura multicuenta utilizando Transit Gateway

2
Comments
22 min read
GDPR Compliance: Building Websites That Comply with European Data Protection Laws
Cover image for GDPR Compliance: Building Websites That Comply with European Data Protection Laws

GDPR Compliance: Building Websites That Comply with European Data Protection Laws

Comments
3 min read
How to Implement AWS Network Firewall in a Multi-Account Architecture Using Transit Gateway
Cover image for How to Implement AWS Network Firewall in a Multi-Account Architecture Using Transit Gateway

How to Implement AWS Network Firewall in a Multi-Account Architecture Using Transit Gateway

Comments
19 min read
Cybersecurity in 2025: Are We Really Ready?

Cybersecurity in 2025: Are We Really Ready?

Comments 1
1 min read
Packet-Level Security: How to Monitor and Detect Network Attacks with Nmap and Wireshark
Cover image for Packet-Level Security: How to Monitor and Detect Network Attacks with Nmap and Wireshark

Packet-Level Security: How to Monitor and Detect Network Attacks with Nmap and Wireshark

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 11, 2025

Outil de Cybersécurité du Jour - Sep 11, 2025

1
Comments
3 min read
The Hidden Power of SafeLine WAF: Load Balancing & Failover on Top of Security

The Hidden Power of SafeLine WAF: Load Balancing & Failover on Top of Security

6
Comments
3 min read
Quantum Experiments Open: Exploring Variational Quantum Classifiers on Amazon Braket
Cover image for Quantum Experiments Open: Exploring Variational Quantum Classifiers on Amazon Braket

Quantum Experiments Open: Exploring Variational Quantum Classifiers on Amazon Braket

3
Comments
2 min read
XXE Injection in React.js — What It Is and How to Prevent It
Cover image for XXE Injection in React.js — What It Is and How to Prevent It

XXE Injection in React.js — What It Is and How to Prevent It

3
Comments
3 min read
Outil de Cybersécurité du Jour - Oct 3, 2025

Outil de Cybersécurité du Jour - Oct 3, 2025

1
Comments
3 min read
I Analyzed 100 Claude MCP Servers and Found Critical Security Flaws in 43% of Them

I Analyzed 100 Claude MCP Servers and Found Critical Security Flaws in 43% of Them

4
Comments 2
5 min read
6 AI Models vs. 3 Advanced Security Vulnerabilities

6 AI Models vs. 3 Advanced Security Vulnerabilities

Comments
9 min read
Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know

Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know

10
Comments
2 min read
Are you hacked?
Cover image for Are you hacked?

Are you hacked?

Comments
4 min read
⚡Building a Scalable Authentication Layer That Cuts Development Time by 60%
Cover image for ⚡Building a Scalable Authentication Layer That Cuts Development Time by 60%

⚡Building a Scalable Authentication Layer That Cuts Development Time by 60%

9
Comments
1 min read
Discover The SSL/TLS Security Analyzer API
Cover image for Discover The SSL/TLS Security Analyzer API

Discover The SSL/TLS Security Analyzer API

Comments
2 min read
🪟 Windows 10 End of Life: What It Means and What You Should Do Now
Cover image for 🪟 Windows 10 End of Life: What It Means and What You Should Do Now

🪟 Windows 10 End of Life: What It Means and What You Should Do Now

1
Comments 1
2 min read
Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

2
Comments
4 min read
Secure Your APIs with Apache APISIX + SafeLine WAF

Secure Your APIs with Apache APISIX + SafeLine WAF

6
Comments
2 min read
Exposing the Achilles' Heel of Audio Deepfake Detection: A Call to Arms

Exposing the Achilles' Heel of Audio Deepfake Detection: A Call to Arms

1
Comments
2 min read
Securing the AI Supply Chain: The Threat Nobody's Talking About
Cover image for Securing the AI Supply Chain: The Threat Nobody's Talking About

Securing the AI Supply Chain: The Threat Nobody's Talking About

Comments 1
8 min read
FlexiSPY and State Surveillance: Technical Lessons from the BBC Kenya Case

FlexiSPY and State Surveillance: Technical Lessons from the BBC Kenya Case

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 14, 2025

Outil de Cybersécurité du Jour - Sep 14, 2025

5
Comments
2 min read
loading...