Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Guide pratique pour sécuriser votre PME contre les cybermenaces

Guide pratique pour sécuriser votre PME contre les cybermenaces

Comments
1 min read
Weekly #33-2025:Patch Tuesday, AI & Careers, Core Fundamentals, Cloud Era

Weekly #33-2025:Patch Tuesday, AI & Careers, Core Fundamentals, Cloud Era

Comments 1
5 min read
Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa
Cover image for Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

1
Comments
1 min read
5 Ways IoT Is Changing the Way Vending Machines Work
Cover image for 5 Ways IoT Is Changing the Way Vending Machines Work

5 Ways IoT Is Changing the Way Vending Machines Work

Comments
3 min read
Qu'est-ce qu'une attaque par prompt injection?
Cover image for Qu'est-ce qu'une attaque par prompt injection?

Qu'est-ce qu'une attaque par prompt injection?

2
Comments
1 min read
Choosing the Right Performance Mode in SafeLine

Choosing the Right Performance Mode in SafeLine

5
Comments
1 min read
How I Caught an MPESA API Leak Hiding in Plain Sight

How I Caught an MPESA API Leak Hiding in Plain Sight

2
Comments
2 min read
10 Best Platforms to Learn Cybersecurity Courses in 2025
Cover image for 10 Best Platforms to Learn Cybersecurity Courses in 2025

10 Best Platforms to Learn Cybersecurity Courses in 2025

2
Comments
5 min read
Application Penetration Testing: Why Your Web and Mobile Apps Need a Security Checkup
Cover image for Application Penetration Testing: Why Your Web and Mobile Apps Need a Security Checkup

Application Penetration Testing: Why Your Web and Mobile Apps Need a Security Checkup

1
Comments
2 min read
ICMP Spoofing with Scapy: Responding to Pings as a Fake IP
Cover image for ICMP Spoofing with Scapy: Responding to Pings as a Fake IP

ICMP Spoofing with Scapy: Responding to Pings as a Fake IP

1
Comments
2 min read
AI Powered Honeypot
Cover image for AI Powered Honeypot

AI Powered Honeypot

Comments
2 min read
Host Your Own Web Firewall with SafeLine — No Cloud Needed

Host Your Own Web Firewall with SafeLine — No Cloud Needed

8
Comments
2 min read
Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Comments
4 min read
Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

6
Comments
2 min read
What is Dangling DNS? (And How It Can Lead to Domain Takeovers)
Cover image for What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

2
Comments
2 min read
I got 99 problems, but a breach ain’t one
Cover image for I got 99 problems, but a breach ain’t one

I got 99 problems, but a breach ain’t one

1
Comments
5 min read
OAuth Misconfiguration in Symfony Explained
Cover image for OAuth Misconfiguration in Symfony Explained

OAuth Misconfiguration in Symfony Explained

3
Comments
3 min read
Future proofing your platform
Cover image for Future proofing your platform

Future proofing your platform

1
Comments
5 min read
Built-In Rate Limiting in SafeLine WAF: What You Need to Know

Built-In Rate Limiting in SafeLine WAF: What You Need to Know

6
Comments
3 min read
SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

6
Comments
2 min read
🛡️ Cybersecurity Review Guide for React & Vite Applications
Cover image for 🛡️ Cybersecurity Review Guide for React & Vite Applications

🛡️ Cybersecurity Review Guide for React & Vite Applications

Comments
2 min read
Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies
Cover image for Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

1
Comments
2 min read
Using SBOMs to detect possible Dependency Confusion
Cover image for Using SBOMs to detect possible Dependency Confusion

Using SBOMs to detect possible Dependency Confusion

Comments 1
4 min read
Remotely Control Any Computer with Mythic C2 and Discord | Step-by-Step Ethical Hacking Guide
Cover image for Remotely Control Any Computer with Mythic C2 and Discord | Step-by-Step Ethical Hacking Guide

Remotely Control Any Computer with Mythic C2 and Discord | Step-by-Step Ethical Hacking Guide

2
Comments
4 min read
Hydra Brute-Force: Optimizing Threads & Cracking FTP/Telnet Passwords
Cover image for Hydra Brute-Force: Optimizing Threads & Cracking FTP/Telnet Passwords

Hydra Brute-Force: Optimizing Threads & Cracking FTP/Telnet Passwords

Comments
2 min read
loading...