Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

Comments
3 min read
How to Protect APIs from Cyber Attacks
Cover image for How to Protect APIs from Cyber Attacks

How to Protect APIs from Cyber Attacks

Comments
3 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works
Cover image for I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency
Cover image for CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency

CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency

Comments
4 min read
Understanding Vertical BOLA in APIs
Cover image for Understanding Vertical BOLA in APIs

Understanding Vertical BOLA in APIs

1
Comments
3 min read
SQL Injection – UNION attack | PortSwigger Lab Note #3

SQL Injection – UNION attack | PortSwigger Lab Note #3

5
Comments
1 min read
Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack
Cover image for Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Comments
3 min read
Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs
Cover image for Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

1
Comments
5 min read
Zero-Trust Architecture in Practice: Real-World Implementation Steps

Zero-Trust Architecture in Practice: Real-World Implementation Steps

Comments
4 min read
Hi, I'm A Security-Minded Software Engineer from Japanđź‘‹

Hi, I'm A Security-Minded Software Engineer from Japanđź‘‹

1
Comments
2 min read
VPN Kill Switch Explained: A Technical Deep Dive into Privacy Protection

VPN Kill Switch Explained: A Technical Deep Dive into Privacy Protection

1
Comments
3 min read
We Red-Teamed Our Own AI Agent (And It Failed Spectacularly)

We Red-Teamed Our Own AI Agent (And It Failed Spectacularly)

1
Comments
10 min read
Improper Disposal of Sensitive Data in Waste Facilities: Implementing Secure Shredding and Disposal Protocols

Improper Disposal of Sensitive Data in Waste Facilities: Implementing Secure Shredding and Disposal Protocols

Comments
11 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.