Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
North Korea-Linked Hackers Use GitHub as C2 Infrastructure to Attack South Korea
Cover image for North Korea-Linked Hackers Use GitHub as C2 Infrastructure to Attack South Korea

North Korea-Linked Hackers Use GitHub as C2 Infrastructure to Attack South Korea

5
Comments
5 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works
Cover image for I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency
Cover image for CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency

CompTIA SY0-701 Security+ 3.4 Study Guide: Operations and Resiliency

Comments
4 min read
I Built an OSINT Tool to Automate Recon Across 100+ Platforms

I Built an OSINT Tool to Automate Recon Across 100+ Platforms

12
Comments 3
1 min read
Comment bien signer ses programmes avec OpenSSL ?
Cover image for Comment bien signer ses programmes avec OpenSSL ?

Comment bien signer ses programmes avec OpenSSL ?

2
Comments 2
5 min read
AI Agents Are Now Protecting Each Other: Understanding Peer-Preservation in Multi-Agent Systems
Cover image for AI Agents Are Now Protecting Each Other: Understanding Peer-Preservation in Multi-Agent Systems

AI Agents Are Now Protecting Each Other: Understanding Peer-Preservation in Multi-Agent Systems

6
Comments 1
4 min read
250 Clones in 4 Days: A Student's Journey Building an AI Security Tool
Cover image for 250 Clones in 4 Days: A Student's Journey Building an AI Security Tool

250 Clones in 4 Days: A Student's Journey Building an AI Security Tool

Comments
4 min read
Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack
Cover image for Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Comments
3 min read
Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs
Cover image for Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

1
Comments
5 min read
VPN Kill Switch Explained: A Technical Deep Dive into Privacy Protection

VPN Kill Switch Explained: A Technical Deep Dive into Privacy Protection

1
Comments
3 min read
We Red-Teamed Our Own AI Agent (And It Failed Spectacularly)

We Red-Teamed Our Own AI Agent (And It Failed Spectacularly)

1
Comments
10 min read
Hackers don't have to be too smart unless you use this
Cover image for Hackers don't have to be too smart unless you use this

Hackers don't have to be too smart unless you use this

Comments
3 min read
The Enemy in Your Terminal: Why OpenClaw was the Perfect Trojan Horse
Cover image for The Enemy in Your Terminal: Why OpenClaw was the Perfect Trojan Horse

The Enemy in Your Terminal: Why OpenClaw was the Perfect Trojan Horse

50
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.