Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
TryHackMe: Server-Side Template Injection (SSTI)
Cover image for TryHackMe: Server-Side Template Injection (SSTI)

TryHackMe: Server-Side Template Injection (SSTI)

3
Comments
6 min read
The $500K Tool That Got Me a Cease-and-Desist from 𝕏

The $500K Tool That Got Me a Cease-and-Desist from 𝕏

Comments
4 min read
🌟 Mass Lead Validation is Coming to Dymo API! 🚀
Cover image for 🌟 Mass Lead Validation is Coming to Dymo API! 🚀

🌟 Mass Lead Validation is Coming to Dymo API! 🚀

1
Comments
1 min read
My Journey with SafeLine: A Practical Tool for Web Security

My Journey with SafeLine: A Practical Tool for Web Security

5
Comments
2 min read
How I Conquered the CISSP Exam

How I Conquered the CISSP Exam

Comments
2 min read
SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

5
Comments
2 min read
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

8
Comments
3 min read
Why Virtual Training with Microsoft Certified Trainers is a Game-Changer for Microsoft 365 Certification

Why Virtual Training with Microsoft Certified Trainers is a Game-Changer for Microsoft 365 Certification

Comments
2 min read
TryHackMe: XXE Injection
Cover image for TryHackMe: XXE Injection

TryHackMe: XXE Injection

1
Comments
15 min read
TryHackMe: Advanced SQL Injection
Cover image for TryHackMe: Advanced SQL Injection

TryHackMe: Advanced SQL Injection

3
Comments
24 min read
How to protect yourself against cyber threats
Cover image for How to protect yourself against cyber threats

How to protect yourself against cyber threats

Comments
3 min read
How to Create Secure and Scalable Web Applications with MERN
Cover image for How to Create Secure and Scalable Web Applications with MERN

How to Create Secure and Scalable Web Applications with MERN

Comments
3 min read
Cybersecurity Certifications: Your Guide to a Successful Career
Cover image for Cybersecurity Certifications: Your Guide to a Successful Career

Cybersecurity Certifications: Your Guide to a Successful Career

Comments
2 min read
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Comments
3 min read
2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

6
Comments
1 min read
TryHackMe: JWT Security
Cover image for TryHackMe: JWT Security

TryHackMe: JWT Security

4
Comments
7 min read
TryHackMe: OAuth Vulnerabilities
Cover image for TryHackMe: OAuth Vulnerabilities

TryHackMe: OAuth Vulnerabilities

1
Comments
13 min read
Prevent Session Replay Attacks in Laravel: A Complete Guide
Cover image for Prevent Session Replay Attacks in Laravel: A Complete Guide

Prevent Session Replay Attacks in Laravel: A Complete Guide

3
Comments
4 min read
Hardware Entropy: The Hidden Foundation of Modern Cryptography

Hardware Entropy: The Hidden Foundation of Modern Cryptography

1
Comments
5 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
Alternatif Web Application Firewall (WAF) untuk Website: Gratis, Berbayar, dan Open-Source

Alternatif Web Application Firewall (WAF) untuk Website: Gratis, Berbayar, dan Open-Source

Comments
2 min read
TryHackMe: Jr Penetration Tester Notes
Cover image for TryHackMe: Jr Penetration Tester Notes

TryHackMe: Jr Penetration Tester Notes

2
Comments
36 min read
TryHackMe: Enumeration & Brute Force
Cover image for TryHackMe: Enumeration & Brute Force

TryHackMe: Enumeration & Brute Force

Comments
2 min read
Importance of Regular Security Audits for Compliance and Cyber Resilience

Importance of Regular Security Audits for Compliance and Cyber Resilience

Comments
4 min read
Ethical WiFi Hacking with Termux: A Guide to Wipwn

Ethical WiFi Hacking with Termux: A Guide to Wipwn

Comments
3 min read
loading...