Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)
Cover image for 🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)

🛡️ Sharing Centurion — my solo Windows security project (early access, feedback welcome!)

1
Comments
1 min read
Is It Worth Starting a Web Hosting Business in Q4 2025? The Honest Outlook
Cover image for Is It Worth Starting a Web Hosting Business in Q4 2025? The Honest Outlook

Is It Worth Starting a Web Hosting Business in Q4 2025? The Honest Outlook

Comments
4 min read
Why Caddy Is My Favorite Reverse Proxy in 2025
Cover image for Why Caddy Is My Favorite Reverse Proxy in 2025

Why Caddy Is My Favorite Reverse Proxy in 2025

Comments
3 min read
Why Bsky.app is Rising While X.com is Declining (and How to Automate Bsky Posts with Python)
Cover image for Why Bsky.app is Rising While X.com is Declining (and How to Automate Bsky Posts with Python)

Why Bsky.app is Rising While X.com is Declining (and How to Automate Bsky Posts with Python)

Comments
5 min read
How I Built a Web Vulnerabilty Scanner - OpenEye
Cover image for How I Built a Web Vulnerabilty Scanner - OpenEye

How I Built a Web Vulnerabilty Scanner - OpenEye

6
Comments
7 min read
Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

4
Comments
3 min read
decoy-hunter — Contrarrestando la Decepción "All Ports Are Open"

decoy-hunter — Contrarrestando la Decepción "All Ports Are Open"

2
Comments
5 min read
Module 2 — Derived Identities and Secure Export Author: Antonio José Socorro Marín Fecha: 28 de septiembre de 2025
Cover image for Module 2 — Derived Identities and Secure Export Author: Antonio José Socorro Marín Fecha: 28 de septiembre de 2025

Module 2 — Derived Identities and Secure Export Author: Antonio José Socorro Marín Fecha: 28 de septiembre de 2025

1
Comments
11 min read
Module 2 — Derived Identities and Secure Export
Cover image for Module 2 — Derived Identities and Secure Export

Module 2 — Derived Identities and Secure Export

1
Comments
4 min read
decoy-hunter — Countering the "All Ports Are Open" Deception Author: Antonio José Socorro Marín Date: September 28, 2025

decoy-hunter — Countering the "All Ports Are Open" Deception Author: Antonio José Socorro Marín Date: September 28, 2025

1
Comments
5 min read
What is DNS and how does it work
Cover image for What is DNS and how does it work

What is DNS and how does it work

Comments
3 min read
The Unspoken Conversation: When Your Code Attracts the Wrong Kind of Attention
Cover image for The Unspoken Conversation: When Your Code Attracts the Wrong Kind of Attention

The Unspoken Conversation: When Your Code Attracts the Wrong Kind of Attention

6
Comments
3 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Cover image for Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Comments
6 min read
How Teaching Cybersecurity Changed the Way I See Hackers
Cover image for How Teaching Cybersecurity Changed the Way I See Hackers

How Teaching Cybersecurity Changed the Way I See Hackers

Comments
2 min read
Why Software Design Patterns Matter for Cybersecurity
Cover image for Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

1
Comments
3 min read
How to future-proof your web app's password authentication
Cover image for How to future-proof your web app's password authentication

How to future-proof your web app's password authentication

1
Comments
5 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
The Cyber Warrior Handbook — A Practical, FREE Entry-Level Offensive Security Training Online
Cover image for The Cyber Warrior Handbook — A Practical, FREE Entry-Level Offensive Security Training Online

The Cyber Warrior Handbook — A Practical, FREE Entry-Level Offensive Security Training Online

Comments
2 min read
Hybrid Infrastructure: Why Businesses Combine Cloud and Physical Servers

Hybrid Infrastructure: Why Businesses Combine Cloud and Physical Servers

Comments
2 min read
Why AI is Becoming Cybersecurity’s Strongest Ally (And Where We’re Headed Next)
Cover image for Why AI is Becoming Cybersecurity’s Strongest Ally (And Where We’re Headed Next)

Why AI is Becoming Cybersecurity’s Strongest Ally (And Where We’re Headed Next)

Comments
2 min read
Outil de Cybersécurité du Jour - Sep 24, 2025

Outil de Cybersécurité du Jour - Sep 24, 2025

1
Comments
3 min read
10 Best Platforms to Learn Cybersecurity in 2026
Cover image for 10 Best Platforms to Learn Cybersecurity in 2026

10 Best Platforms to Learn Cybersecurity in 2026

Comments 1
5 min read
Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas
Cover image for Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

1
Comments
4 min read
Why I Built a Free Security Scanner That Makes Sense
Cover image for Why I Built a Free Security Scanner That Makes Sense

Why I Built a Free Security Scanner That Makes Sense

3
Comments 1
5 min read
loading...