Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
From Proof of Concept to Production: Building an Enterprise-Grade Platform for AI Systems

From Proof of Concept to Production: Building an Enterprise-Grade Platform for AI Systems

1
Comments
10 min read
How an Independent Developer Defended Their Open‑Source Project from Cloning, Accusations, and Abuse

How an Independent Developer Defended Their Open‑Source Project from Cloning, Accusations, and Abuse

2
Comments
3 min read
Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar
Cover image for Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

1
Comments
4 min read
The Deterministic SOC2 API
Cover image for The Deterministic SOC2 API

The Deterministic SOC2 API

Comments
3 min read
AI is changing how we build software: here's how to do it safely
Cover image for AI is changing how we build software: here's how to do it safely

AI is changing how we build software: here's how to do it safely

Comments
6 min read
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries
Cover image for OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

7
Comments 5
4 min read
Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)
Cover image for Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)

Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)

Comments
2 min read
Day 1 — Back to Scratch: Relearning Python Without Autopilot
Cover image for Day 1 — Back to Scratch: Relearning Python Without Autopilot

Day 1 — Back to Scratch: Relearning Python Without Autopilot

5
Comments
2 min read
Prompt Injection Is the “Social Engineering” of AI Apps
Cover image for Prompt Injection Is the “Social Engineering” of AI Apps

Prompt Injection Is the “Social Engineering” of AI Apps

1
Comments 1
2 min read
🔍 Beginner’s Guide to Nmap: Understanding Network Scanning for Cybersecurity
Cover image for 🔍 Beginner’s Guide to Nmap: Understanding Network Scanning for Cybersecurity

🔍 Beginner’s Guide to Nmap: Understanding Network Scanning for Cybersecurity

Comments
2 min read
Vens: Stop Patching Vulnerabilities That Don't Matter to You
Cover image for Vens: Stop Patching Vulnerabilities That Don't Matter to You

Vens: Stop Patching Vulnerabilities That Don't Matter to You

1
Comments 1
2 min read
How to Enable MAC Address Randomisation in Linux Desktop

How to Enable MAC Address Randomisation in Linux Desktop

Comments
2 min read
I Turned an EXE Into Music (and it actually tells you something)

I Turned an EXE Into Music (and it actually tells you something)

Comments
4 min read
Offline vs Cloud: the Real Threat Model in Password Managers
Cover image for Offline vs Cloud: the Real Threat Model in Password Managers

Offline vs Cloud: the Real Threat Model in Password Managers

1
Comments
2 min read
Building a SOC Assistant CLI with GitHub Copilot to Detect Real Attack Patterns

GitHub Copilot CLI Challenge Submission

Building a SOC Assistant CLI with GitHub Copilot to Detect Real Attack Patterns

4
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.