Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Built a Python Network Scanner That Thinks Like an Attacker

How I Built a Python Network Scanner That Thinks Like an Attacker

Comments
4 min read
A Weekend Exploring the World of Hackers, Scammers, and Online Deception
Cover image for A Weekend Exploring the World of Hackers, Scammers, and Online Deception

A Weekend Exploring the World of Hackers, Scammers, and Online Deception

1
Comments
5 min read
đź’ˇ The Hidden Cost of Trusting Default Security Po
Cover image for đź’ˇ The Hidden Cost of Trusting Default Security Po

đź’ˇ The Hidden Cost of Trusting Default Security Po

1
Comments
4 min read
Week 1 – Linux User and Group Management

Week 1 – Linux User and Group Management

Comments 1
1 min read
[EP.01] XSS Attack Explained — How Hackers Steal Sessions Without Your Password
Cover image for [EP.01] XSS Attack Explained — How Hackers Steal Sessions Without Your Password

[EP.01] XSS Attack Explained — How Hackers Steal Sessions Without Your Password

3
Comments
2 min read
SurfaceLens V2 — Infrastructure Attack Surface & Shadow IT Intelligence Engine by Rugero Tesla (404saint)

SurfaceLens V2 — Infrastructure Attack Surface & Shadow IT Intelligence Engine by Rugero Tesla (404saint)

11
Comments
3 min read
An AI Found a 27-Year-Old Bug in OpenBSD- The Most Security-Hardened OS on Earth
Cover image for An AI Found a 27-Year-Old Bug in OpenBSD- The Most Security-Hardened OS on Earth

An AI Found a 27-Year-Old Bug in OpenBSD- The Most Security-Hardened OS on Earth

1
Comments
8 min read
[EP.02] Session Hijacking — The XSS Attack That Steals Your Account
Cover image for [EP.02] Session Hijacking — The XSS Attack That Steals Your Account

[EP.02] Session Hijacking — The XSS Attack That Steals Your Account

7
Comments 2
1 min read
Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes
Cover image for Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes

Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes

Comments
6 min read
Why Supply Chain Security Fails in the Real World

Why Supply Chain Security Fails in the Real World

Comments
7 min read
When Proxies Become the Attack Vectors in Web Architectures

When Proxies Become the Attack Vectors in Web Architectures

1
Comments
5 min read
TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs
Cover image for TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

Comments
5 min read
Day 18: The Danger of Wildcards (*) & Library Injection 🕵️‍♂️

Day 18: The Danger of Wildcards (*) & Library Injection 🕵️‍♂️

1
Comments
1 min read
CompTIA Security+ SY0-701 4.2 Study Guide: Asset Management
Cover image for CompTIA Security+ SY0-701 4.2 Study Guide: Asset Management

CompTIA Security+ SY0-701 4.2 Study Guide: Asset Management

Comments
4 min read
Understanding Web Shell Attacks

Understanding Web Shell Attacks

1
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.