Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Fix Weak API Authentication in Laravel (With Code Examples)
Cover image for How to Fix Weak API Authentication in Laravel (With Code Examples)

How to Fix Weak API Authentication in Laravel (With Code Examples)

3
Comments
3 min read
Cybersecurity: The High-Demand, Low-Competition Career Alternative to Software Engineering
Cover image for Cybersecurity: The High-Demand, Low-Competition Career Alternative to Software Engineering

Cybersecurity: The High-Demand, Low-Competition Career Alternative to Software Engineering

1
Comments
3 min read
TryHackMe: LDAP Injection
Cover image for TryHackMe: LDAP Injection

TryHackMe: LDAP Injection

3
Comments
8 min read
TryHackMe: ORM Injection
Cover image for TryHackMe: ORM Injection

TryHackMe: ORM Injection

2
Comments
9 min read
TryHackMe: Server-Side Template Injection (SSTI)
Cover image for TryHackMe: Server-Side Template Injection (SSTI)

TryHackMe: Server-Side Template Injection (SSTI)

3
Comments
6 min read
The $500K Tool That Got Me a Cease-and-Desist from 𝕏

The $500K Tool That Got Me a Cease-and-Desist from 𝕏

Comments
4 min read
🌟 Mass Lead Validation is Coming to Dymo API! 🚀
Cover image for 🌟 Mass Lead Validation is Coming to Dymo API! 🚀

🌟 Mass Lead Validation is Coming to Dymo API! 🚀

1
Comments
1 min read
My Journey with SafeLine: A Practical Tool for Web Security

My Journey with SafeLine: A Practical Tool for Web Security

5
Comments
2 min read
How I Conquered the CISSP Exam

How I Conquered the CISSP Exam

Comments
2 min read
SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

5
Comments
2 min read
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

8
Comments
3 min read
Why Virtual Training with Microsoft Certified Trainers is a Game-Changer for Microsoft 365 Certification

Why Virtual Training with Microsoft Certified Trainers is a Game-Changer for Microsoft 365 Certification

Comments
2 min read
TryHackMe: XXE Injection
Cover image for TryHackMe: XXE Injection

TryHackMe: XXE Injection

1
Comments
15 min read
TryHackMe: Advanced SQL Injection
Cover image for TryHackMe: Advanced SQL Injection

TryHackMe: Advanced SQL Injection

4
Comments
24 min read
How to protect yourself against cyber threats
Cover image for How to protect yourself against cyber threats

How to protect yourself against cyber threats

Comments
3 min read
How to Create Secure and Scalable Web Applications with MERN
Cover image for How to Create Secure and Scalable Web Applications with MERN

How to Create Secure and Scalable Web Applications with MERN

Comments
3 min read
Cybersecurity Certifications: Your Guide to a Successful Career
Cover image for Cybersecurity Certifications: Your Guide to a Successful Career

Cybersecurity Certifications: Your Guide to a Successful Career

Comments
2 min read
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Comments
3 min read
2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

6
Comments
1 min read
TryHackMe: JWT Security
Cover image for TryHackMe: JWT Security

TryHackMe: JWT Security

4
Comments
7 min read
TryHackMe: OAuth Vulnerabilities
Cover image for TryHackMe: OAuth Vulnerabilities

TryHackMe: OAuth Vulnerabilities

2
Comments
13 min read
Prevent Session Replay Attacks in Laravel: A Complete Guide
Cover image for Prevent Session Replay Attacks in Laravel: A Complete Guide

Prevent Session Replay Attacks in Laravel: A Complete Guide

3
Comments
4 min read
BlackClown : AI-Assisted Tools for RCE Vulnerability Test, Discovery & Exploitation

BlackClown : AI-Assisted Tools for RCE Vulnerability Test, Discovery & Exploitation

Comments
2 min read
Hardware Entropy: The Hidden Foundation of Modern Cryptography

Hardware Entropy: The Hidden Foundation of Modern Cryptography

1
Comments
5 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
loading...