Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Hackers Use Your IP Address (And Why You Should Actually Care)
Cover image for How Hackers Use Your IP Address (And Why You Should Actually Care)

How Hackers Use Your IP Address (And Why You Should Actually Care)

8
Comments 1
3 min read
cPanel in 2025 — Still the King of Hosting, or Time to Move On?
Cover image for cPanel in 2025 — Still the King of Hosting, or Time to Move On?

cPanel in 2025 — Still the King of Hosting, or Time to Move On?

Comments 1
3 min read
Building a simple TCP port scanner in C

Building a simple TCP port scanner in C

1
Comments
2 min read
Your response to the Shai-Hulud supply chain attack
Cover image for Your response to the Shai-Hulud supply chain attack

Your response to the Shai-Hulud supply chain attack

6
Comments
4 min read
Outil de Cybersécurité du Jour - Aug 31, 2025

Outil de Cybersécurité du Jour - Aug 31, 2025

1
Comments
3 min read
Is It Worth Starting a Web Hosting Business in Q4 2025? The Honest Outlook
Cover image for Is It Worth Starting a Web Hosting Business in Q4 2025? The Honest Outlook

Is It Worth Starting a Web Hosting Business in Q4 2025? The Honest Outlook

Comments 1
4 min read
Hands-On Exploitation with Metasploitable2: From Scanning to Mitigation
Cover image for Hands-On Exploitation with Metasploitable2: From Scanning to Mitigation

Hands-On Exploitation with Metasploitable2: From Scanning to Mitigation

1
Comments
2 min read
Master the Art of Penetration Testing: A Hands-On Guide for Developers
Cover image for Master the Art of Penetration Testing: A Hands-On Guide for Developers

Master the Art of Penetration Testing: A Hands-On Guide for Developers

3
Comments
6 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Cover image for Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

2
Comments
3 min read
Red Hat confirmed a breach of its internal GitLab server

Red Hat confirmed a breach of its internal GitLab server

Comments
2 min read
Android Security Misconfigurations: Key Findings and Recommendations for Clients

Android Security Misconfigurations: Key Findings and Recommendations for Clients

Comments
3 min read
Ruby and Cybersecurity: Essential Security Practices for Modern Applications

Ruby and Cybersecurity: Essential Security Practices for Modern Applications

5
Comments
8 min read
Outil de Cybersécurité du Jour - Aug 30, 2025

Outil de Cybersécurité du Jour - Aug 30, 2025

Comments
3 min read
#DAY 7: The First Fire Drill: Incident Simulation
Cover image for #DAY 7: The First Fire Drill: Incident Simulation

#DAY 7: The First Fire Drill: Incident Simulation

Comments
3 min read
The Unspoken Rules: Key Insights From My 15-Year Climb from Junior Specialist to Startup Founder
Cover image for The Unspoken Rules: Key Insights From My 15-Year Climb from Junior Specialist to Startup Founder

The Unspoken Rules: Key Insights From My 15-Year Climb from Junior Specialist to Startup Founder

2
Comments
46 min read
How AI Is Disrupting The Legal Field Changing Past Practices and Shaping the Future

How AI Is Disrupting The Legal Field Changing Past Practices and Shaping the Future

Comments
4 min read
WhatsApp Patches Zero-Click Exploit on iOS and macOS
Cover image for WhatsApp Patches Zero-Click Exploit on iOS and macOS

WhatsApp Patches Zero-Click Exploit on iOS and macOS

1
Comments
1 min read
Introducing QRGuard - Open Source QR code Security App

Introducing QRGuard - Open Source QR code Security App

Comments
2 min read
Smartbi Access Bypass Vulnerability Leads to Admin Takeover

Smartbi Access Bypass Vulnerability Leads to Admin Takeover

6
Comments
2 min read
Designing a Scalable, Serverless Vulnerability Data Processing Pipeline on AWS

Designing a Scalable, Serverless Vulnerability Data Processing Pipeline on AWS

Comments
6 min read
Hello Everyone

Hello Everyone

Comments
1 min read
Unblocking Halo Uploads with SafeLine WAF

Unblocking Halo Uploads with SafeLine WAF

6
Comments
3 min read
How to Set Up TLS on Cloudflare: A Step-by-Step Guide
Cover image for How to Set Up TLS on Cloudflare: A Step-by-Step Guide

How to Set Up TLS on Cloudflare: A Step-by-Step Guide

1
Comments
3 min read
Cloud Misconfigurations: The Hidden Door Hackers Love
Cover image for Cloud Misconfigurations: The Hidden Door Hackers Love

Cloud Misconfigurations: The Hidden Door Hackers Love

Comments
3 min read
CVE-2023-42442: JumpServer Session Replay Leak Could Expose Sensitive Ops Data

CVE-2023-42442: JumpServer Session Replay Leak Could Expose Sensitive Ops Data

6
Comments
2 min read
loading...