Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security Alert: XXE Vulnerability in Weaver e-cology OA

Security Alert: XXE Vulnerability in Weaver e-cology OA

6
Comments
2 min read
Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders
Cover image for Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

1
Comments
3 min read
Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Comments
3 min read
Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications
Cover image for Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

1
Comments
3 min read
Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

10
Comments
3 min read
The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

1
Comments
4 min read
Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks
Cover image for Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

2
Comments
3 min read
SafeLine WAF: Hands-On With the Free Open Source Web Application Firewall

SafeLine WAF: Hands-On With the Free Open Source Web Application Firewall

6
Comments
3 min read
How to Secure Different User Types in Linux: A Guide for IT Teams
Cover image for How to Secure Different User Types in Linux: A Guide for IT Teams

How to Secure Different User Types in Linux: A Guide for IT Teams

1
Comments
5 min read
Blackbird: The AI-Powered OSINT Account Enumeration Tool

Blackbird: The AI-Powered OSINT Account Enumeration Tool

3
Comments
2 min read
Security as Physics: Thinking About Networks Like Energy Systems
Cover image for Security as Physics: Thinking About Networks Like Energy Systems

Security as Physics: Thinking About Networks Like Energy Systems

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 7, 2025

Outil de Cybersécurité du Jour - Sep 7, 2025

5
Comments
3 min read
Assinatura Digital em Elixir com Criptografia Assimétrica

Assinatura Digital em Elixir com Criptografia Assimétrica

Comments
4 min read
The Hidden Dangers of Online PDF Editors and File Converters
Cover image for The Hidden Dangers of Online PDF Editors and File Converters

The Hidden Dangers of Online PDF Editors and File Converters

Comments
6 min read
Cybersecurity Weekly #4 :Best Browsers for Privacy in 2025: Chrome vs Brave vs Firefox

Cybersecurity Weekly #4 :Best Browsers for Privacy in 2025: Chrome vs Brave vs Firefox

1
Comments 1
2 min read
Lessons from SocialBox: Modern Defenses Against Brute Force
Cover image for Lessons from SocialBox: Modern Defenses Against Brute Force

Lessons from SocialBox: Modern Defenses Against Brute Force

1
Comments
4 min read
Hardening Authentication: Practical Steps Beyond Passwords

Hardening Authentication: Practical Steps Beyond Passwords

1
Comments
4 min read
Why Brute Force Attacks Fail More Often Today
Cover image for Why Brute Force Attacks Fail More Often Today

Why Brute Force Attacks Fail More Often Today

1
Comments
4 min read
Man-in-the-Middle Attacks Explained (And How to Stay Safe)

Man-in-the-Middle Attacks Explained (And How to Stay Safe)

7
Comments
3 min read
Password Cracking Project #1 – From Privilege Escalation to Hashcat
Cover image for Password Cracking Project #1 – From Privilege Escalation to Hashcat

Password Cracking Project #1 – From Privilege Escalation to Hashcat

5
Comments
1 min read
Improving Security with .NET Aspire
Cover image for Improving Security with .NET Aspire

Improving Security with .NET Aspire

1
Comments
2 min read
Running VMs in the cloud:AWS Virtualization for Beginners
Cover image for Running VMs in the cloud:AWS Virtualization for Beginners

Running VMs in the cloud:AWS Virtualization for Beginners

2
Comments 1
2 min read
CWE-1434: Insecure Setting of #Generative AI/ML #Model Inference #Parameters
Cover image for CWE-1434: Insecure Setting of #Generative AI/ML #Model Inference #Parameters

CWE-1434: Insecure Setting of #Generative AI/ML #Model Inference #Parameters

1
Comments
1 min read
Element: The Open-Source Federated System for Secure Messaging, Voice, and Video

Element: The Open-Source Federated System for Secure Messaging, Voice, and Video

1
Comments
1 min read
Revolutionizing Cybersecurity with AI: The CAI Framework

Revolutionizing Cybersecurity with AI: The CAI Framework

5
Comments
3 min read
loading...