Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Your Airline’s Chatbot is a Security Risk (and How to Fix It)
Cover image for Why Your Airline’s Chatbot is a Security Risk (and How to Fix It)

Why Your Airline’s Chatbot is a Security Risk (and How to Fix It)

5
Comments
3 min read
LLM Security Alert: 91,000+ Attacks Probing Enterprise AI Endpoints (And How to Stop Them)
Cover image for LLM Security Alert: 91,000+ Attacks Probing Enterprise AI Endpoints (And How to Stop Them)

LLM Security Alert: 91,000+ Attacks Probing Enterprise AI Endpoints (And How to Stop Them)

5
Comments
5 min read
The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers
Cover image for The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers

The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers

Comments
6 min read
LanManVan: My Journey Building a Modular Security Framework in Go
Cover image for LanManVan: My Journey Building a Modular Security Framework in Go

LanManVan: My Journey Building a Modular Security Framework in Go

5
Comments
2 min read
I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

Comments
6 min read
When Data Breaches Become Loyalty Programs: How $1.17 Billion in Vouchers Broke the Security Incentive Model
Cover image for When Data Breaches Become Loyalty Programs: How $1.17 Billion in Vouchers Broke the Security Incentive Model

When Data Breaches Become Loyalty Programs: How $1.17 Billion in Vouchers Broke the Security Incentive Model

Comments
6 min read
How to Set Up Your First IAM User in 5 Minutes on AWS
Cover image for How to Set Up Your First IAM User in 5 Minutes on AWS

How to Set Up Your First IAM User in 5 Minutes on AWS

Comments
2 min read
I built a Python tool to hunt down Remote Access Trojans on Windows

I built a Python tool to hunt down Remote Access Trojans on Windows

Comments
1 min read
7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733
Cover image for 7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

3
Comments
9 min read
Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

6
Comments
4 min read
Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks

Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks

Comments
8 min read
Zero Trust in 2025 Is Less About Vision, More About Friction
Cover image for Zero Trust in 2025 Is Less About Vision, More About Friction

Zero Trust in 2025 Is Less About Vision, More About Friction

1
Comments
5 min read
I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

Comments
1 min read
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It
Cover image for Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

1
Comments
7 min read
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis
Cover image for Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

1
Comments
12 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.