Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
PayPal Settles Cybersecurity Allegations with NY Regulators for $2M

PayPal Settles Cybersecurity Allegations with NY Regulators for $2M

Comments
4 min read
Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them
Cover image for Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them

Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them

Comments
5 min read
Monsif Hmouri and Moroccan Black Cyber Army Hack Israeli Channel for Palestine
Cover image for Monsif Hmouri and Moroccan Black Cyber Army Hack Israeli Channel for Palestine

Monsif Hmouri and Moroccan Black Cyber Army Hack Israeli Channel for Palestine

Comments
2 min read
🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

5
Comments
1 min read
Secrets Management Best Practices for Team Collaboration
Cover image for Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
Detecting Insider Threats with File Integrity Monitoring: Practical Insights

Detecting Insider Threats with File Integrity Monitoring: Practical Insights

Comments
5 min read
Cybersecurity Testing: How to Simulate Real Attack Scenarios

Cybersecurity Testing: How to Simulate Real Attack Scenarios

Comments
4 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Top Hacking Gadgets for 2025 - @verylazytech

Top Hacking Gadgets for 2025 - @verylazytech

7
Comments
1 min read
Työkalu - Ubuntu vs Kali
Cover image for Työkalu - Ubuntu vs Kali

Työkalu - Ubuntu vs Kali

Comments
2 min read
Prevent Unvalidated Redirects in Laravel Securely
Cover image for Prevent Unvalidated Redirects in Laravel Securely

Prevent Unvalidated Redirects in Laravel Securely

4
Comments
2 min read
REACT Tips and Tricks to Excel

REACT Tips and Tricks to Excel

Comments
3 min read
Vietnam Launches a Unified Approach to Cyber Threats with Incident Response Alliance

Vietnam Launches a Unified Approach to Cyber Threats with Incident Response Alliance

Comments
2 min read
🔒 Why HTTPS Matters: Securing Your Website in 2025 🚀

🔒 Why HTTPS Matters: Securing Your Website in 2025 🚀

5
Comments
2 min read
Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Comments
3 min read
Building an Ethical Hacking Robot with ROS2: WiFi Scanner Implementation
Cover image for Building an Ethical Hacking Robot with ROS2: WiFi Scanner Implementation

Building an Ethical Hacking Robot with ROS2: WiFi Scanner Implementation

Comments
4 min read
Tríade CIA e Sua Importância na Cibersegurança.
Cover image for Tríade CIA e Sua Importância na Cibersegurança.

Tríade CIA e Sua Importância na Cibersegurança.

Comments
3 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
End-To-End Encryption
Cover image for End-To-End Encryption

End-To-End Encryption

Comments
3 min read
Comprehensive CEH v13 Study Guide

Comprehensive CEH v13 Study Guide

7
Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm
Cover image for Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm
Cover image for Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Comments
4 min read
Content Security Policy Bypass in Laravel: Risks and Mitigations

Content Security Policy Bypass in Laravel: Risks and Mitigations

3
Comments
4 min read
Deploying a Cowrie SSH Honeypot on a home server. 🍯

Deploying a Cowrie SSH Honeypot on a home server. 🍯

1
Comments
4 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
loading...