Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The USB that Changed Warfare: Lessons from Stuxnet
Cover image for The USB that Changed Warfare: Lessons from Stuxnet

The USB that Changed Warfare: Lessons from Stuxnet

Comments
2 min read
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means
Cover image for When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

Comments
4 min read
2026’s CSA XCON in Dehradun
Cover image for 2026’s CSA XCON in Dehradun

2026’s CSA XCON in Dehradun

Comments
4 min read
CVE-2025-3248: Kerentanan Kritis pada Platform AI Langflow dan Cara Melindungi Jaringan Anda
Cover image for CVE-2025-3248: Kerentanan Kritis pada Platform AI Langflow dan Cara Melindungi Jaringan Anda

CVE-2025-3248: Kerentanan Kritis pada Platform AI Langflow dan Cara Melindungi Jaringan Anda

Comments
15 min read
Exploring the Concept of 'The Ghost in the Machine'
Cover image for Exploring the Concept of 'The Ghost in the Machine'

Exploring the Concept of 'The Ghost in the Machine'

Comments
3 min read
Online Scams Targeting Older Adults And How To Stop Them
Cover image for Online Scams Targeting Older Adults And How To Stop Them

Online Scams Targeting Older Adults And How To Stop Them

Comments
3 min read
How a Small SaaS Team Secured Their Web App with a Self-Hosted WAF: A SafeLine User Case Study

How a Small SaaS Team Secured Their Web App with a Self-Hosted WAF: A SafeLine User Case Study

Comments
3 min read
How a Solo Developer Secured a Personal Tech Blog with SafeLine in Under 15 Minutes

How a Solo Developer Secured a Personal Tech Blog with SafeLine in Under 15 Minutes

Comments
3 min read
Phishing-Resistant Sign-In: What Developers Can Do Now (Without Turning UX Into a Nightmare)
Cover image for Phishing-Resistant Sign-In: What Developers Can Do Now (Without Turning UX Into a Nightmare)

Phishing-Resistant Sign-In: What Developers Can Do Now (Without Turning UX Into a Nightmare)

Comments
5 min read
Building a Forensic Image Analyser: Bridging the Gap in OSINT Investigations
Cover image for Building a Forensic Image Analyser: Bridging the Gap in OSINT Investigations

Building a Forensic Image Analyser: Bridging the Gap in OSINT Investigations

Comments
2 min read
How SafeLine WAF Became My Go-To Solution for Web Security and Performance Optimization

How SafeLine WAF Became My Go-To Solution for Web Security and Performance Optimization

Comments
4 min read
Llama Guard: What It Actually Does (And Doesn't Do)
Cover image for Llama Guard: What It Actually Does (And Doesn't Do)

Llama Guard: What It Actually Does (And Doesn't Do)

1
Comments
8 min read
Crypto Theft Isn't a Bug, It's the Feature We Refuse to Admit
Cover image for Crypto Theft Isn't a Bug, It's the Feature We Refuse to Admit

Crypto Theft Isn't a Bug, It's the Feature We Refuse to Admit

Comments
6 min read
Brain.A turns 40 🥳 - A Bedtime Story
Cover image for Brain.A turns 40 🥳 - A Bedtime Story

Brain.A turns 40 🥳 - A Bedtime Story

15
Comments 1
4 min read
The Ghost in the Machine: Is Your Software Secretly Sabotaging Your SEO?
Cover image for The Ghost in the Machine: Is Your Software Secretly Sabotaging Your SEO?

The Ghost in the Machine: Is Your Software Secretly Sabotaging Your SEO?

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.