Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Amazon Braket - Quantum Linguistic Security: Finnish Agglutinative Morphology Meets AI Defense
Cover image for Amazon Braket - Quantum Linguistic Security: Finnish Agglutinative Morphology Meets AI Defense

Amazon Braket - Quantum Linguistic Security: Finnish Agglutinative Morphology Meets AI Defense

4
Comments
3 min read
Building AI Systems That Don't Break Under Attack
Cover image for Building AI Systems That Don't Break Under Attack

Building AI Systems That Don't Break Under Attack

1
Comments
7 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery
Cover image for Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

1
Comments
4 min read
Security Alert: XXE Vulnerability in Weaver e-cology OA

Security Alert: XXE Vulnerability in Weaver e-cology OA

6
Comments
2 min read
Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders
Cover image for Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

1
Comments
3 min read
Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Comments
3 min read
Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications
Cover image for Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

1
Comments
3 min read
Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

10
Comments
3 min read
The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

1
Comments
4 min read
Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks
Cover image for Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

2
Comments
3 min read
SafeLine WAF: Hands-On With the Free Open Source Web Application Firewall

SafeLine WAF: Hands-On With the Free Open Source Web Application Firewall

6
Comments
3 min read
How to Secure Different User Types in Linux: A Guide for IT Teams
Cover image for How to Secure Different User Types in Linux: A Guide for IT Teams

How to Secure Different User Types in Linux: A Guide for IT Teams

1
Comments
5 min read
Blackbird: The AI-Powered OSINT Account Enumeration Tool

Blackbird: The AI-Powered OSINT Account Enumeration Tool

3
Comments
2 min read
Security as Physics: Thinking About Networks Like Energy Systems
Cover image for Security as Physics: Thinking About Networks Like Energy Systems

Security as Physics: Thinking About Networks Like Energy Systems

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 7, 2025

Outil de Cybersécurité du Jour - Sep 7, 2025

5
Comments
3 min read
Assinatura Digital em Elixir com Criptografia Assimétrica

Assinatura Digital em Elixir com Criptografia Assimétrica

Comments
4 min read
The Hidden Dangers of Online PDF Editors and File Converters
Cover image for The Hidden Dangers of Online PDF Editors and File Converters

The Hidden Dangers of Online PDF Editors and File Converters

Comments
6 min read
Cybersecurity Weekly #4 :Best Browsers for Privacy in 2025: Chrome vs Brave vs Firefox

Cybersecurity Weekly #4 :Best Browsers for Privacy in 2025: Chrome vs Brave vs Firefox

1
Comments 1
2 min read
Lessons from SocialBox: Modern Defenses Against Brute Force
Cover image for Lessons from SocialBox: Modern Defenses Against Brute Force

Lessons from SocialBox: Modern Defenses Against Brute Force

1
Comments
4 min read
Why Brute Force Attacks Fail More Often Today
Cover image for Why Brute Force Attacks Fail More Often Today

Why Brute Force Attacks Fail More Often Today

1
Comments
4 min read
Hardening Authentication: Practical Steps Beyond Passwords

Hardening Authentication: Practical Steps Beyond Passwords

1
Comments
4 min read
Man-in-the-Middle Attacks Explained (And How to Stay Safe)

Man-in-the-Middle Attacks Explained (And How to Stay Safe)

7
Comments
3 min read
Password Cracking Project #1 – From Privilege Escalation to Hashcat
Cover image for Password Cracking Project #1 – From Privilege Escalation to Hashcat

Password Cracking Project #1 – From Privilege Escalation to Hashcat

5
Comments
1 min read
loading...