Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
$25,000 Bug Bounty for a GraphQL Security Flaw!
Cover image for $25,000 Bug Bounty for a GraphQL Security Flaw!

$25,000 Bug Bounty for a GraphQL Security Flaw!

Comments
1 min read
How my Kid’s tablet turned me into a Cybersecurity Analyst
Cover image for How my Kid’s tablet turned me into a Cybersecurity Analyst

How my Kid’s tablet turned me into a Cybersecurity Analyst

Comments 1
2 min read
What to do if you forgot your SafeLine WAF login password?

What to do if you forgot your SafeLine WAF login password?

6
Comments
1 min read
What is Splunk Infrastructure Monitoring?

What is Splunk Infrastructure Monitoring?

Comments
3 min read
De LLM jailbreaking a 1-click session hijacking

De LLM jailbreaking a 1-click session hijacking

3
Comments
3 min read
Scope of Cloud Security Solutions in 2025

Scope of Cloud Security Solutions in 2025

Comments
4 min read
Boas Práticas de Segurança e Qualidade no Terraform

Boas Práticas de Segurança e Qualidade no Terraform

1
Comments
3 min read
On-Premise vs. Cloud Logging: Pros, Cons, and Use Cases
Cover image for On-Premise vs. Cloud Logging: Pros, Cons, and Use Cases

On-Premise vs. Cloud Logging: Pros, Cons, and Use Cases

Comments
15 min read
How to Know if a Platform is Fake/Scam: Protect Yourself from Online Fraud

How to Know if a Platform is Fake/Scam: Protect Yourself from Online Fraud

3
Comments 1
4 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Comments
1 min read
AWS WAF: Keeping Your Web Applications Secure

AWS WAF: Keeping Your Web Applications Secure

Comments
3 min read
Web3 Operational Security: Lessons from the Bybit $1.4B Wallet Safe Hack
Cover image for Web3 Operational Security: Lessons from the Bybit $1.4B Wallet Safe Hack

Web3 Operational Security: Lessons from the Bybit $1.4B Wallet Safe Hack

1
Comments 5
16 min read
Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Comments
6 min read
Setting up a pentest lab with an Android Phone and Kali Linux
Cover image for Setting up a pentest lab with an Android Phone and Kali Linux

Setting up a pentest lab with an Android Phone and Kali Linux

1
Comments
7 min read
Cyber Attacks

Cyber Attacks

Comments
2 min read
What Happens When Apps Collect Too Much User Data?

What Happens When Apps Collect Too Much User Data?

1
Comments
11 min read
Quantum Key Distribution: A Beginner’s Guide
Cover image for Quantum Key Distribution: A Beginner’s Guide

Quantum Key Distribution: A Beginner’s Guide

Comments
15 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
WhoWeB Scanner - Simple Website Scanner Tool
Cover image for WhoWeB Scanner - Simple Website Scanner Tool

WhoWeB Scanner - Simple Website Scanner Tool

Comments
1 min read
TryHackMe: HTTP/2 Request Smuggling

TryHackMe: HTTP/2 Request Smuggling

Comments
14 min read
Upgrading wazuh 4.11.0 using docker in single node
Cover image for Upgrading wazuh 4.11.0 using docker in single node

Upgrading wazuh 4.11.0 using docker in single node

1
Comments
1 min read
TryHackMe: HTTP Request Smuggling
Cover image for TryHackMe: HTTP Request Smuggling

TryHackMe: HTTP Request Smuggling

1
Comments
3 min read
How to Ensure AWS S3 Bucket Security Best Practices

How to Ensure AWS S3 Bucket Security Best Practices

1
Comments
1 min read
Top 10 European Open-Source Projects to Watch in 2025
Cover image for Top 10 European Open-Source Projects to Watch in 2025

Top 10 European Open-Source Projects to Watch in 2025

6
Comments
26 min read
Top AWS Services Every Cloud Computing Professional Should Know

Top AWS Services Every Cloud Computing Professional Should Know

Comments
4 min read
loading...