Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-0798: Gitea's Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers

CVE-2026-0798: Gitea's Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers

Comments
2 min read
CVE-2026-1225: XML Ghosts in the Machine: Configuring Your Way to RCE in Logback

CVE-2026-1225: XML Ghosts in the Machine: Configuring Your Way to RCE in Logback

Comments
2 min read
CVE-2026-24132: CVE-2026-24132: Orval's Mock Generator Did What You Told It To (And That's The Problem)

CVE-2026-24132: CVE-2026-24132: Orval's Mock Generator Did What You Told It To (And That's The Problem)

Comments
2 min read
Intrusion Detection System (IDS) and why a firewall alone won't save you from attacks
Cover image for Intrusion Detection System (IDS) and why a firewall alone won't save you from attacks

Intrusion Detection System (IDS) and why a firewall alone won't save you from attacks

1
Comments
1 min read
Drive-By Script Injection

Drive-By Script Injection

Comments
2 min read
CVE-2025-22234: The 73rd Byte: How a Spring Security Fix Created a Timing Leak

CVE-2025-22234: The 73rd Byte: How a Spring Security Fix Created a Timing Leak

Comments
2 min read
GHSA-JP3Q-WWP3-PWV9: Freeform, Free Execution: Stored XSS in Craft CMS's Favorite Form Builder

GHSA-JP3Q-WWP3-PWV9: Freeform, Free Execution: Stored XSS in Craft CMS's Favorite Form Builder

Comments
2 min read
Meshtastic Security: A Realistic Threat Model for Off-Grid Networks
Cover image for Meshtastic Security: A Realistic Threat Model for Off-Grid Networks

Meshtastic Security: A Realistic Threat Model for Off-Grid Networks

Comments
2 min read
CVE-2025-5419 - Google Chrome V8 Engine Out-of-Bounds Read/Write Vulnerability
Cover image for CVE-2025-5419 - Google Chrome V8 Engine Out-of-Bounds Read/Write Vulnerability

CVE-2025-5419 - Google Chrome V8 Engine Out-of-Bounds Read/Write Vulnerability

Comments
9 min read
How to practice Security Code Reviews
Cover image for How to practice Security Code Reviews

How to practice Security Code Reviews

1
Comments
2 min read
Brave New World of Scammers Targeting Developers

Brave New World of Scammers Targeting Developers

Comments
15 min read
GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

Comments
2 min read
Stop Being a Script Kiddie: building a Port Scanner with Python 🐍
Cover image for Stop Being a Script Kiddie: building a Port Scanner with Python 🐍

Stop Being a Script Kiddie: building a Port Scanner with Python 🐍

1
Comments
3 min read
Self-hosted WAFs in Cloud-Native Storage Architectures: What Security Teams Need to Know

Self-hosted WAFs in Cloud-Native Storage Architectures: What Security Teams Need to Know

Comments
3 min read
Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks
Cover image for Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Comments
7 min read
CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

Comments
2 min read
GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

Comments
2 min read
Understanding the Latest OWASP Top 10 2025 Changes
Cover image for Understanding the Latest OWASP Top 10 2025 Changes

Understanding the Latest OWASP Top 10 2025 Changes

Comments
4 min read
Understanding Encryption in LoRa & Meshtastic Networks
Cover image for Understanding Encryption in LoRa & Meshtastic Networks

Understanding Encryption in LoRa & Meshtastic Networks

Comments
2 min read
Understanding Prompt Injection Attacks

Understanding Prompt Injection Attacks

1
Comments
5 min read
CVE-2026-24001: Diffing Dangerously: Infinite Loops and ReDoS in jsdiff

CVE-2026-24001: Diffing Dangerously: Infinite Loops and ReDoS in jsdiff

Comments
2 min read
OSI Layer 9—The Council: Governance, Power, and the Politics of Security
Cover image for OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
The Epistemology of Offense and Defense: A Foundational Framework
Cover image for The Epistemology of Offense and Defense: A Foundational Framework

The Epistemology of Offense and Defense: A Foundational Framework

Comments
6 min read
AI-SPM Explained: How to Secure AI Agents
Cover image for AI-SPM Explained: How to Secure AI Agents

AI-SPM Explained: How to Secure AI Agents

5
Comments
4 min read
Fetch-Based URL Injection

Fetch-Based URL Injection

Comments
1 min read
loading...