Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2024-38077: Critical RCE in Windows RDL Service

CVE-2024-38077: Critical RCE in Windows RDL Service

6
Comments
3 min read
วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

Comments 1
1 min read
Roundcube: CVE-2025-49113 Room | TryHackMe

Roundcube: CVE-2025-49113 Room | TryHackMe

1
Comments
4 min read
"A wild goose never laid a tame egg" - I rebuild the Xerxes DDoS Tool
Cover image for "A wild goose never laid a tame egg" - I rebuild the Xerxes DDoS Tool

"A wild goose never laid a tame egg" - I rebuild the Xerxes DDoS Tool

1
Comments 2
6 min read
🚜 Code Like It Matters: A Guide to Secure Coding (from someone who broke it before fixing it)
Cover image for 🚜 Code Like It Matters: A Guide to Secure Coding (from someone who broke it before fixing it)

🚜 Code Like It Matters: A Guide to Secure Coding (from someone who broke it before fixing it)

Comments
2 min read
Пентестинг: основы, преимущества и применение
Cover image for Пентестинг: основы, преимущества и применение

Пентестинг: основы, преимущества и применение

1
Comments
1 min read
Ensuring Security and Compliance in Cloud-Native AWS Environments

Ensuring Security and Compliance in Cloud-Native AWS Environments

2
Comments
3 min read
CVE-2025-48928: TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability
Cover image for CVE-2025-48928: TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability

CVE-2025-48928: TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability

Comments
1 min read
CVE-2025-48927: TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability
Cover image for CVE-2025-48927: TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability

CVE-2025-48927: TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability

Comments
1 min read
Was my data leaked?

Was my data leaked?

Comments
1 min read
CVE-2025-5419: Google Chromium V8 Out-of-Bounds Read and Write Vulnerability
Cover image for CVE-2025-5419: Google Chromium V8 Out-of-Bounds Read and Write Vulnerability

CVE-2025-5419: Google Chromium V8 Out-of-Bounds Read and Write Vulnerability

Comments
1 min read
CVE-2025-2783: Google Chromium Mojo Sandbox Escape Vulnerability
Cover image for CVE-2025-2783: Google Chromium Mojo Sandbox Escape Vulnerability

CVE-2025-2783: Google Chromium Mojo Sandbox Escape Vulnerability

Comments
2 min read
CVE-2025-4664: Google Chromium Loader Insufficient Policy Enforcement Vulnerability
Cover image for CVE-2025-4664: Google Chromium Loader Insufficient Policy Enforcement Vulnerability

CVE-2025-4664: Google Chromium Loader Insufficient Policy Enforcement Vulnerability

Comments
2 min read
Seeking Contributors for PoC Development of My Concepts

Seeking Contributors for PoC Development of My Concepts

5
Comments
1 min read
Dreaming | TryHackMe

Dreaming | TryHackMe

2
Comments 2
6 min read
AI-Powered Cybersecurity Systems: Attack Prediction Models
Cover image for AI-Powered Cybersecurity Systems: Attack Prediction Models

AI-Powered Cybersecurity Systems: Attack Prediction Models

5
Comments 1
6 min read
The basics commands of Linux

The basics commands of Linux

Comments
1 min read
API Vulnerabilities in Symfony: Real-World Examples
Cover image for API Vulnerabilities in Symfony: Real-World Examples

API Vulnerabilities in Symfony: Real-World Examples

2
Comments
3 min read
CVE-2024-43451: Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability
Cover image for CVE-2024-43451: Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability

CVE-2024-43451: Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability

Comments
2 min read
🛑 Still in the disk group? You’re one command from root.

🛑 Still in the disk group? You’re one command from root.

Comments
1 min read
Supply Chain Attacks: The Silent Killer with THM Nagpur
Cover image for Supply Chain Attacks: The Silent Killer with THM Nagpur

Supply Chain Attacks: The Silent Killer with THM Nagpur

5
Comments
4 min read
I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)
Cover image for I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

3
Comments
1 min read
Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP
Cover image for Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

2
Comments
3 min read
Generative AI: The Double-Edged Sword in Cloud-Native Security

Generative AI: The Double-Edged Sword in Cloud-Native Security

1
Comments
9 min read
Where it all started.

Where it all started.

1
Comments
4 min read
loading...