Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)
Cover image for I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)

I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)

3
Comments
5 min read
Lazarus Group Evolves: From Fake token coins to Fake CVEs — New GitHub Phishing Wave
Cover image for Lazarus Group Evolves: From Fake token coins to Fake CVEs — New GitHub Phishing Wave

Lazarus Group Evolves: From Fake token coins to Fake CVEs — New GitHub Phishing Wave

5
Comments
5 min read
AI Agent Hack: Prompt‑Layer Security Is the Real Threat

AI Agent Hack: Prompt‑Layer Security Is the Real Threat

Comments
7 min read
From RSA to ECC: The Impact of Quantum Computing on Modern Cryptography
Cover image for From RSA to ECC: The Impact of Quantum Computing on Modern Cryptography

From RSA to ECC: The Impact of Quantum Computing on Modern Cryptography

4
Comments
7 min read
Invited talk : Adversarial Attacks and Defenses in Deep Learning Systems: Threats, Mechanisms, and Countermeasures

Invited talk : Adversarial Attacks and Defenses in Deep Learning Systems: Threats, Mechanisms, and Countermeasures

Comments
1 min read
LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure
Cover image for LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure

LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure

1
Comments
12 min read
Day 3 Learning

Day 3 Learning

Comments
1 min read
The Security Crisis Hiding Inside Machine Identities

The Security Crisis Hiding Inside Machine Identities

1
Comments
5 min read
CompTIA Security+ SY0-701 5.4 Study Guide: Compliance and Privacy
Cover image for CompTIA Security+ SY0-701 5.4 Study Guide: Compliance and Privacy

CompTIA Security+ SY0-701 5.4 Study Guide: Compliance and Privacy

Comments
3 min read
How Hackers Exploit RDP (Port 3389) — Real Attack Breakdown & Prevention Guide
Cover image for How Hackers Exploit RDP (Port 3389) — Real Attack Breakdown & Prevention Guide

How Hackers Exploit RDP (Port 3389) — Real Attack Breakdown & Prevention Guide

1
Comments
2 min read
Adversarial Attacks and Defenses in Deep Learning Systems: Threats, Mechanisms, and Countermeasures

Adversarial Attacks and Defenses in Deep Learning Systems: Threats, Mechanisms, and Countermeasures

1
Comments
6 min read
Cybeetle: A Practical AI Layer for Security Analysis in Modern Codebases

Cybeetle: A Practical AI Layer for Security Analysis in Modern Codebases

1
Comments
2 min read
What's Device Fingerprinting?
Cover image for What's Device Fingerprinting?

What's Device Fingerprinting?

Comments
2 min read
Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️

Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️

Comments
1 min read
Trivy Vulnerability Scanner Compromised in Supply Chain Attack: Mitigation Steps and User Guidance

Trivy Vulnerability Scanner Compromised in Supply Chain Attack: Mitigation Steps and User Guidance

1
Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.