Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Day 11: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Day 11: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Comments
1 min read
Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis
Cover image for Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis

Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis

Comments
5 min read
Why I Moved Part of My Traffic Off a Cloud WAF In 2026
Cover image for Why I Moved Part of My Traffic Off a Cloud WAF In 2026

Why I Moved Part of My Traffic Off a Cloud WAF In 2026

1
Comments
4 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

Comments
3 min read
How to Protect APIs from Cyber Attacks
Cover image for How to Protect APIs from Cyber Attacks

How to Protect APIs from Cyber Attacks

Comments
3 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works
Cover image for I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
Hardening Web Applications Against AI Crawlers with SafeLine WAF

Hardening Web Applications Against AI Crawlers with SafeLine WAF

Comments
3 min read
CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency
Cover image for CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency

CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency

Comments
4 min read
Webinar on integrating SAST into DevSecOps
Cover image for Webinar on integrating SAST into DevSecOps

Webinar on integrating SAST into DevSecOps

1
Comments
1 min read
Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

1
Comments
21 min read
Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack
Cover image for Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Comments
3 min read
Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs
Cover image for Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

1
Comments
5 min read
Hi, I'm A Security-Minded Software Engineer from Japanđź‘‹

Hi, I'm A Security-Minded Software Engineer from Japanđź‘‹

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.