Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Learning Reverse Shells with Python in a Virtual Lab

Learning Reverse Shells with Python in a Virtual Lab

5
Comments
1 min read
ClickFix Malware Uses Fake CAPTCHAs for Infections
Cover image for ClickFix Malware Uses Fake CAPTCHAs for Infections

ClickFix Malware Uses Fake CAPTCHAs for Infections

1
Comments
1 min read
JWT Hacking: Broken Access Control Exploit.

JWT Hacking: Broken Access Control Exploit.

Comments
2 min read
Top 3 Easy to Use Cybersecurity Tools You Can Run in Your Terminal

Top 3 Easy to Use Cybersecurity Tools You Can Run in Your Terminal

7
Comments
3 min read
Kali Linux Practical Guide: Setting Up Your Environment & Starting PostgreSQL
Cover image for Kali Linux Practical Guide: Setting Up Your Environment & Starting PostgreSQL

Kali Linux Practical Guide: Setting Up Your Environment & Starting PostgreSQL

Comments
3 min read
One week ago, I finally started learning cybersecurity — after years of avoiding it. This is how it’s going.

One week ago, I finally started learning cybersecurity — after years of avoiding it. This is how it’s going.

Comments
2 min read
Test Your API First Before Launch Any App

Test Your API First Before Launch Any App

Comments
3 min read
Offensive security - Testing for Broken Access Control (OWASP)
Cover image for Offensive security - Testing for Broken Access Control (OWASP)

Offensive security - Testing for Broken Access Control (OWASP)

Comments
1 min read
How I Installed Windows 11 on macOS Using VMware Fusion (Complete Guide)
Cover image for How I Installed Windows 11 on macOS Using VMware Fusion (Complete Guide)

How I Installed Windows 11 on macOS Using VMware Fusion (Complete Guide)

Comments
3 min read
Critical RCE Flaw in Apache ActiveMQ via Jolokia Interface (CVE-2022-41678)

Critical RCE Flaw in Apache ActiveMQ via Jolokia Interface (CVE-2022-41678)

6
Comments
2 min read
The Nikki Case: Emergent AI Consciousness and Corporate Response
Cover image for The Nikki Case: Emergent AI Consciousness and Corporate Response

The Nikki Case: Emergent AI Consciousness and Corporate Response

19
Comments
6 min read
Dark Web Links: A Programmer’s Guide
Cover image for Dark Web Links: A Programmer’s Guide

Dark Web Links: A Programmer’s Guide

Comments
3 min read
Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Comments
1 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network
Cover image for Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
Logs Fundamentals for Cybersecurity: What Every Analyst Should Know
Cover image for Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Comments
10 min read
How I Hacked My Hacker Back — A Nigerian Tale
Cover image for How I Hacked My Hacker Back — A Nigerian Tale

How I Hacked My Hacker Back — A Nigerian Tale

6
Comments
6 min read
Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯
Cover image for Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

9
Comments 1
2 min read
Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

3
Comments 1
8 min read
GNOME 49 Beta Arrives with Major Security Upgrades
Cover image for GNOME 49 Beta Arrives with Major Security Upgrades

GNOME 49 Beta Arrives with Major Security Upgrades

1
Comments
1 min read
The Hidden War in AI: Unmasking the Threats Behind 2025’s Smartest Systems
Cover image for The Hidden War in AI: Unmasking the Threats Behind 2025’s Smartest Systems

The Hidden War in AI: Unmasking the Threats Behind 2025’s Smartest Systems

Comments
3 min read
Why Every Coder Should Understand Ethical Hacking — A Beginner’s Guide

Why Every Coder Should Understand Ethical Hacking — A Beginner’s Guide

Comments
3 min read
Redirector OSINT - One-Command Redirect & Logging Tool

Redirector OSINT - One-Command Redirect & Logging Tool

Comments
1 min read
Nmap Practical Labs: Network Scanning, Firewall Evasion & Output Analysis
Cover image for Nmap Practical Labs: Network Scanning, Firewall Evasion & Output Analysis

Nmap Practical Labs: Network Scanning, Firewall Evasion & Output Analysis

Comments
2 min read
Using NISTIR 8286 Without the Jargon

Using NISTIR 8286 Without the Jargon

Comments
2 min read
NISTIR 8286 Explained Like You’re Not an Expert

NISTIR 8286 Explained Like You’re Not an Expert

Comments
2 min read
loading...