Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Exploring Zeek: A Powerful Network Security Monitoring Tool

Exploring Zeek: A Powerful Network Security Monitoring Tool

Comments
2 min read
How I Almost Lost My eCommerce Business to a Cyberattack: 5 Essential Security Tips You Need Today
Cover image for How I Almost Lost My eCommerce Business to a Cyberattack: 5 Essential Security Tips You Need Today

How I Almost Lost My eCommerce Business to a Cyberattack: 5 Essential Security Tips You Need Today

Comments
4 min read
How to Transition from IT Support to Cybersecurity: A Complete Career Guide
Cover image for How to Transition from IT Support to Cybersecurity: A Complete Career Guide

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

26
Comments 6
5 min read
Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI
Cover image for Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Comments
4 min read
Understanding Password Attacks and Key Indicators of Compromise
Cover image for Understanding Password Attacks and Key Indicators of Compromise

Understanding Password Attacks and Key Indicators of Compromise

Comments
6 min read
Splunk Boss of the SOC- Corelight trickbot ctf
Cover image for Splunk Boss of the SOC- Corelight trickbot ctf

Splunk Boss of the SOC- Corelight trickbot ctf

5
Comments
5 min read
Why SysLogs over UDP is silly? Security POV

Why SysLogs over UDP is silly? Security POV

1
Comments
2 min read
🔒 Securing the Cloud: My AWS Security Learning Journey 🚀

🔒 Securing the Cloud: My AWS Security Learning Journey 🚀

1
Comments
1 min read
Non-Human Identity Security in the Age of AI
Cover image for Non-Human Identity Security in the Age of AI

Non-Human Identity Security in the Age of AI

Comments 1
7 min read
Should I Consider Writing a Book? 🤔

Should I Consider Writing a Book? 🤔

5
Comments
1 min read
Prevent Business Logic Vulnerabilities in Laravel
Cover image for Prevent Business Logic Vulnerabilities in Laravel

Prevent Business Logic Vulnerabilities in Laravel

3
Comments
3 min read
Why Zero-Day Vulnerabilities Are Exploding and How to Protect Your Business

Why Zero-Day Vulnerabilities Are Exploding and How to Protect Your Business

Comments
2 min read
Cybersecurity : my initial thoughts on it

Cybersecurity : my initial thoughts on it

7
Comments
1 min read
PayPal Settles Cybersecurity Allegations with NY Regulators for $2M

PayPal Settles Cybersecurity Allegations with NY Regulators for $2M

Comments
4 min read
Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them
Cover image for Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them

Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them

Comments
5 min read
Navigating the Cybersecurity Maze: Challenges and Solutions in AI Agent Development
Cover image for Navigating the Cybersecurity Maze: Challenges and Solutions in AI Agent Development

Navigating the Cybersecurity Maze: Challenges and Solutions in AI Agent Development

Comments
19 min read
Monsif Hmouri and Moroccan Black Cyber Army Hack Israeli Channel for Palestine
Cover image for Monsif Hmouri and Moroccan Black Cyber Army Hack Israeli Channel for Palestine

Monsif Hmouri and Moroccan Black Cyber Army Hack Israeli Channel for Palestine

Comments
2 min read
🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

5
Comments
1 min read
Detecting Insider Threats with File Integrity Monitoring: Practical Insights

Detecting Insider Threats with File Integrity Monitoring: Practical Insights

Comments
5 min read
Secrets Management Best Practices for Team Collaboration
Cover image for Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
Cybersecurity Testing: How to Simulate Real Attack Scenarios

Cybersecurity Testing: How to Simulate Real Attack Scenarios

Comments
4 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Top Hacking Gadgets for 2025 - @verylazytech

Top Hacking Gadgets for 2025 - @verylazytech

7
Comments
1 min read
Työkalu - Ubuntu vs Kali
Cover image for Työkalu - Ubuntu vs Kali

Työkalu - Ubuntu vs Kali

Comments
2 min read
Prevent Unvalidated Redirects in Laravel Securely
Cover image for Prevent Unvalidated Redirects in Laravel Securely

Prevent Unvalidated Redirects in Laravel Securely

4
Comments
2 min read
loading...