Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🧭 OpenVPN vs WireGuard: Which Protocol Should Developers Use in 2025?

🧭 OpenVPN vs WireGuard: Which Protocol Should Developers Use in 2025?

4
Comments
4 min read
Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders
Cover image for Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

3
Comments
3 min read
At-Rest vs In-Transit Encryption

At-Rest vs In-Transit Encryption

1
Comments
1 min read
Bug Bounty Hunting for GenAI
Cover image for Bug Bounty Hunting for GenAI

Bug Bounty Hunting for GenAI

Comments
8 min read
Securing the Software Supply Chain with Immutable Artifacts in Jenkins
Cover image for Securing the Software Supply Chain with Immutable Artifacts in Jenkins

Securing the Software Supply Chain with Immutable Artifacts in Jenkins

Comments
5 min read
Quick Tunnel: Local Web to Public Domain

Quick Tunnel: Local Web to Public Domain

Comments
1 min read
🔐Back to the Roots: Nostalgic Journey to University CTF Battles of the Early 2010s

🔐Back to the Roots: Nostalgic Journey to University CTF Battles of the Early 2010s

Comments
8 min read
Hexadecimal: The Secret Language of Networks (and MAC Addresses)
Cover image for Hexadecimal: The Secret Language of Networks (and MAC Addresses)

Hexadecimal: The Secret Language of Networks (and MAC Addresses)

1
Comments
2 min read
Difference Between SOC 1 and SOC 2: A Complete Guide

Difference Between SOC 1 and SOC 2: A Complete Guide

1
Comments
2 min read
Weekly #40-2025: Rethinking How We Build, Secure, and Simplify Software

Weekly #40-2025: Rethinking How We Build, Secure, and Simplify Software

Comments
4 min read
Day 0 - Payroll Admin to Cybersecurity Analyst

Day 0 - Payroll Admin to Cybersecurity Analyst

Comments
1 min read
Claude vs Humans: Anthropic's CTF Run

Claude vs Humans: Anthropic's CTF Run

Comments
5 min read
How the Dark Web Actually Works: The Tech Behind the Curtain(part2)
Cover image for How the Dark Web Actually Works: The Tech Behind the Curtain(part2)

How the Dark Web Actually Works: The Tech Behind the Curtain(part2)

9
Comments
3 min read
Binary: The Language That Runs the World (and Your Wi-Fi)
Cover image for Binary: The Language That Runs the World (and Your Wi-Fi)

Binary: The Language That Runs the World (and Your Wi-Fi)

1
Comments
3 min read
5 Common Security Mistakes Developers Still Make (and How to Fix Them)
Cover image for 5 Common Security Mistakes Developers Still Make (and How to Fix Them)

5 Common Security Mistakes Developers Still Make (and How to Fix Them)

2
Comments
5 min read
DirectAdmin in 2025 — The Lightweight Alternative to cPanel and Plesk
Cover image for DirectAdmin in 2025 — The Lightweight Alternative to cPanel and Plesk

DirectAdmin in 2025 — The Lightweight Alternative to cPanel and Plesk

Comments
3 min read
Cybersecurity Steganography: How Defenders Face Hidden Data

Cybersecurity Steganography: How Defenders Face Hidden Data

Comments
3 min read
Why I Built a Free Security Scanner That Makes Sense
Cover image for Why I Built a Free Security Scanner That Makes Sense

Why I Built a Free Security Scanner That Makes Sense

1
Comments 1
5 min read
Building a simple TCP port scanner in C

Building a simple TCP port scanner in C

Comments
2 min read
How the hash was won
Cover image for How the hash was won

How the hash was won

6
Comments
2 min read
Ruby and Cybersecurity: Essential Security Practices for Modern Applications

Ruby and Cybersecurity: Essential Security Practices for Modern Applications

5
Comments
8 min read
💸 RBI’s Zero Liability Rule: Your Ultimate Shield Against Cyber Fraud in India
Cover image for 💸 RBI’s Zero Liability Rule: Your Ultimate Shield Against Cyber Fraud in India

💸 RBI’s Zero Liability Rule: Your Ultimate Shield Against Cyber Fraud in India

1
Comments
4 min read
AI Has Gone Physical: Can We Still Keep It Safe?
Cover image for AI Has Gone Physical: Can We Still Keep It Safe?

AI Has Gone Physical: Can We Still Keep It Safe?

Comments
5 min read
From n8n Winner to Chrome AI Pioneer: Building SOC-CERT Guardian extension with Virtual CVE Intelligence 🚀
Cover image for From n8n Winner to Chrome AI Pioneer: Building SOC-CERT Guardian extension with Virtual CVE Intelligence 🚀

From n8n Winner to Chrome AI Pioneer: Building SOC-CERT Guardian extension with Virtual CVE Intelligence 🚀

11
Comments
5 min read
CRITICAL RCE ALERT: Patch CVE-2025-61932 in LANSCOPE Endpoint Manager NOW! (Actively Exploited)

CRITICAL RCE ALERT: Patch CVE-2025-61932 in LANSCOPE Endpoint Manager NOW! (Actively Exploited)

5
Comments
3 min read
loading...