Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI Browsers and Prompt Injection: The New Cybersecurity Frontier
Cover image for AI Browsers and Prompt Injection: The New Cybersecurity Frontier

AI Browsers and Prompt Injection: The New Cybersecurity Frontier

3
Comments 5
6 min read
How to Prove to Clients That Your Firm’s Cloud Is Secure: Certifications, Audits, and Building Trust

How to Prove to Clients That Your Firm’s Cloud Is Secure: Certifications, Audits, and Building Trust

Comments
5 min read
Building a safer cURL using TOR
Cover image for Building a safer cURL using TOR

Building a safer cURL using TOR

5
Comments 2
3 min read
Deepfakes Are on the Rise: How Worried Should We Be?
Cover image for Deepfakes Are on the Rise: How Worried Should We Be?

Deepfakes Are on the Rise: How Worried Should We Be?

Comments
6 min read
Firewall Fundamentals | TryHackMe Write-Up

Firewall Fundamentals | TryHackMe Write-Up

Comments
2 min read
IDS Fundamentals | TryHackMe Write-Up

IDS Fundamentals | TryHackMe Write-Up

Comments
2 min read
CyberChef: The Basics | TryHackMe Write-Up

CyberChef: The Basics | TryHackMe Write-Up

Comments
3 min read
4 ερωτήσεις για IT Systems Architect (Αρχιτέκτονας Συστημάτων Πληροφορικής). Τομέας: Ασφάλεια & Διαχείριση Πρόσβασης.

4 ερωτήσεις για IT Systems Architect (Αρχιτέκτονας Συστημάτων Πληροφορικής). Τομέας: Ασφάλεια & Διαχείριση Πρόσβασης.

Comments
1 min read
Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

1
Comments
10 min read
🕵️‍♂️ Understanding Sybil Attacks: When One User Pretends to Be Many
Cover image for 🕵️‍♂️ Understanding Sybil Attacks: When One User Pretends to Be Many

🕵️‍♂️ Understanding Sybil Attacks: When One User Pretends to Be Many

Comments
3 min read
SOC 2 vs. ISO 27001: Which Matters More for Legal Practices and Building Client Trust

SOC 2 vs. ISO 27001: Which Matters More for Legal Practices and Building Client Trust

Comments
4 min read
Plesk in 2025 — The All-in-One Hosting Control Panel That Might Just Replace Everything Else
Cover image for Plesk in 2025 — The All-in-One Hosting Control Panel That Might Just Replace Everything Else

Plesk in 2025 — The All-in-One Hosting Control Panel That Might Just Replace Everything Else

Comments
3 min read
What Is Tailscale? The VPN That Doesn’t Suck
Cover image for What Is Tailscale? The VPN That Doesn’t Suck

What Is Tailscale? The VPN That Doesn’t Suck

Comments
3 min read
What Is Rancher? The DevOps Superpower You Didn’t Know You Needed
Cover image for What Is Rancher? The DevOps Superpower You Didn’t Know You Needed

What Is Rancher? The DevOps Superpower You Didn’t Know You Needed

Comments
3 min read
Pen Testing OT/SCADA Systems

Pen Testing OT/SCADA Systems

Comments
6 min read
Containerization: The Future of Secure and Seamless Application Deployment using KASM Workspace
Cover image for Containerization: The Future of Secure and Seamless Application Deployment using KASM Workspace

Containerization: The Future of Secure and Seamless Application Deployment using KASM Workspace

Comments
4 min read
Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Comments
4 min read
Building Centurion, a Windows cybersecurity tool to fight phishing, malware & C2 traffic
Cover image for Building Centurion, a Windows cybersecurity tool to fight phishing, malware & C2 traffic

Building Centurion, a Windows cybersecurity tool to fight phishing, malware & C2 traffic

1
Comments
2 min read
🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)
Cover image for 🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)

🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)

1
Comments
1 min read
Why Caddy Is My Favorite Reverse Proxy in 2025
Cover image for Why Caddy Is My Favorite Reverse Proxy in 2025

Why Caddy Is My Favorite Reverse Proxy in 2025

Comments
3 min read
Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet
Cover image for Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet

Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet

17
Comments
5 min read
Why Bsky.app is Rising While X.com is Declining (and How to Automate Bsky Posts with Python)
Cover image for Why Bsky.app is Rising While X.com is Declining (and How to Automate Bsky Posts with Python)

Why Bsky.app is Rising While X.com is Declining (and How to Automate Bsky Posts with Python)

Comments
5 min read
How I Built a Web Vulnerabilty Scanner - OpenEye
Cover image for How I Built a Web Vulnerabilty Scanner - OpenEye

How I Built a Web Vulnerabilty Scanner - OpenEye

6
Comments
7 min read
What is DNS and how does it work
Cover image for What is DNS and how does it work

What is DNS and how does it work

Comments
3 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
loading...