Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enterprise-Level Identity Auth in a Self-Hosted WAF, SafeLine (and it's Free)

Enterprise-Level Identity Auth in a Self-Hosted WAF, SafeLine (and it's Free)

5
Comments
2 min read
Best Online Resources to Pass Any Palo Alto Certification Exam

Best Online Resources to Pass Any Palo Alto Certification Exam

Comments 1
4 min read
OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

5
Comments
2 min read
Cybersecurity vs. AI: Which Tech Career Should You Pick in 2025?

Cybersecurity vs. AI: Which Tech Career Should You Pick in 2025?

Comments 2
6 min read
Critical Next.js Middleware Bypass Affects Popular AI Apps (CVE-2025-29927)

Critical Next.js Middleware Bypass Affects Popular AI Apps (CVE-2025-29927)

6
Comments
3 min read
🚀 Back online – and getting ready for what’s next.

🚀 Back online – and getting ready for what’s next.

Comments 1
1 min read
🧪 Exploiting Blind SQL Injection by Triggering Time Delays

🧪 Exploiting Blind SQL Injection by Triggering Time Delays

Comments 1
3 min read
🕵️‍♂️ I Found a Telegram Bot That Handles Fake Emails Like a Pro (And I Had to Talk About It)

🕵️‍♂️ I Found a Telegram Bot That Handles Fake Emails Like a Pro (And I Had to Talk About It)

Comments
2 min read
Lock & Key: A Developer’s Guide to Encryption and Decryption in JavaScript

Lock & Key: A Developer’s Guide to Encryption and Decryption in JavaScript

20
Comments 5
3 min read
Hack Happens. Are You Ready to Respond?

Hack Happens. Are You Ready to Respond?

8
Comments 4
3 min read
🔐 June: Password Management Month – Strengthen Your Digital Locks

🔐 June: Password Management Month – Strengthen Your Digital Locks

Comments
2 min read
Building Rate Limiting That Actually Works

Building Rate Limiting That Actually Works

1
Comments
8 min read
Rapports d'investigations

Rapports d'investigations

Comments
2 min read
🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

1
Comments
1 min read
Ghost in the Network

Ghost in the Network

Comments
3 min read
🔐 AppArmor and ROS2 – The Article I Tried Not to Write

🔐 AppArmor and ROS2 – The Article I Tried Not to Write

Comments
4 min read
Mastering REST API Authentication: A Developer's Security Handbook

Mastering REST API Authentication: A Developer's Security Handbook

Comments
4 min read
Cipher's Log: Introduction

Cipher's Log: Introduction

Comments
2 min read
Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Comments
4 min read
Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Comments
2 min read
Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Comments
2 min read
Best Practices for Creating Strong and Secure Passwords

Best Practices for Creating Strong and Secure Passwords

Comments
4 min read
Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Comments
2 min read
⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

Comments
3 min read
Hydra Hands-On: Exploiting Telnet & Attacking FTP Services for Password Cracking

Hydra Hands-On: Exploiting Telnet & Attacking FTP Services for Password Cracking

Comments
3 min read
loading...