██FR█████ █INTELL███████████
frenchintelligence.org
cybersecurity
SafeLine WAF Setup Guide — Protecting Your Homelab Apps Like a Pro
August 19, 2025
SafeLine WAF — The Self-Hosted Firewall Every Homelab Needs
August 19, 2025
Building a Cryptographically Secure Password Generator in C# .NET
August 19, 2025
Cybersecurity Tutorial: Your Complete Step-by-Step Guide
August 18, 2025
GNOME 49 Beta Arrives with Major Security Upgrades
August 16, 2025
Generative AI can spot a cyberattack before you can blink — but it might also help the attacker get in.
August 15, 2025
Protect Your Python Secrets Like a Pro with PyShield-Secure
August 15, 2025
MCP + VS Code: Assisted pentest on an HTB box — from install to first flag
August 14, 2025
When AI Fights Back: The Next Decade of Digital Security
August 14, 2025
CVE-2025-8875: N-able N-Central Insecure Deserialization Vulnerability
August 13, 2025
CVE-2025-8876: N-able N-Central Command Injection Vulnerability
August 13, 2025
Siber Güvenlik Refleksi: Apache ve CUPS Üzerinde Nmap & Nikto Test Süreci
August 13, 2025
Siber Güvenlik Refleksi: Apache ve CUPS Üzerinde Nmap & Nikto Test Süreci
August 13, 2025
CVE-2013-3893: Microsoft Internet Explorer Resource Management Errors Vulnerability
August 12, 2025
CVE-2007-0671: Microsoft Office Excel Remote Code Execution Vulnerability
August 12, 2025
Outil de Cybersécurité du Jour – Aug 12, 2025
August 12, 2025
Outil de Cybersécurité du Jour – Aug 12, 2025
August 12, 2025
[0day] Critical RCE Vulnerability in Atlassian Confluence (CVE-2023-22518) — What You Need to Know
August 12, 2025
CVE-2024-9680: Mozilla Firefox Use-After-Free Vulnerability
August 11, 2025
CVE-2024-49039: Microsoft Windows Task Scheduler Privilege Escalation Vulnerability
August 11, 2025
Blockchain and Cryptocurrency Security: DeFi Protocol Analysis
August 10, 2025
Supply Chain Security: Third-Party Risk Assessment Framework
August 10, 2025
Cryptographic Implementation Flaws: Modern Encryption Analysis
August 10, 2025
API Security Testing: GraphQL and REST Vulnerability Assessment
August 10, 2025
Cloud Security Architecture: Multi-Cloud Protection Strategies
August 10, 2025
IoT Security Vulnerabilities: Embedded Systems Protection
August 10, 2025
Social Engineering Attacks: Human Factor Security Analysis
August 10, 2025
Brazil Hit by AI Phishing and Efimer Crypto Trojan
August 9, 2025
Brazil Hit by AI Phishing and Efimer Crypto Trojan
August 9, 2025
Secure Your Network Using Termux Scanning Tools
August 8, 2025
Setting Up Pi Zero for Pi-Fi Hacking
August 8, 2025
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense
August 7, 2025
Chromium XXE Flaw Exposes Local Files (CVE-2023-4357)
August 7, 2025
Chromium XXE Flaw Exposes Local Files (CVE-2023-4357)
August 7, 2025
The Cybersecurity Scripts I Use to Test My Own Systems
August 7, 2025
Image Poisoning Is Real: How to Spot and Avoid Manipulated Visuals Online
August 4, 2025
The HackerNoon Newsletter: 9 Things Hollywood Gets Wrong About Hacking (8/3/2025)
August 3, 2025
How to Configure SSL Certificates in Nginx for Secure HTTPS Connections
August 3, 2025
Revival Hijacking: How Deleted PyPI Packages Become Threats
August 2, 2025
Documenting the curiosity that keeps me (barely) sane
August 2, 2025
DNS: The Hidden Battlefield No One Talks About
July 31, 2025
How 3 Lines of Code Broke NVIDIA’s AI Cloud
July 31, 2025
APT Explained: From Nation-State Actors to Naming Conventions
July 31, 2025
How to Switch SafeLine WAF to a Valid SSL Certificate
July 30, 2025
how to make the world’s simplest malware in C
July 30, 2025
CVE-2024-55550: Mitel MiCollab Path Traversal Vulnerability
July 26, 2025
xonPlus Launches Real-Time Breach Alerting Platform For Enterprise Credential Exposure
July 25, 2025
Quantum Root
July 24, 2025
How I created a successful recon tool for bug hunters and how you can build one too
July 22, 2025
CVE-2025-49706: Microsoft SharePoint Improper Authentication Vulnerability
July 22, 2025
CVE-2025-49704: Microsoft SharePoint Code Injection Vulnerability
July 22, 2025
Restarting My Journey Into Tech & Cybersecurity
July 22, 2025
Critical NVIDIA Flaw Exposes AI Cloud Services
July 20, 2025
AI Isn’t a Magical Coworker—It’s Just Outsourcing in Disguise
July 19, 2025
The Many Benefits and Use Cases of Having an EDR Solution
July 18, 2025
SafeLine WAF Installation & Upgrade Troubleshooting Guide
July 17, 2025
Step-by-Step Guide to Resolving SafeLine WAF License Errors
July 16, 2025
GitGuardian Launches MCP Server To Bring Secrets Security Into Developer Workflows
July 15, 2025
GitGuardian Launches MCP Server To Bring Secrets Security Into Developer Workflows
July 15, 2025
Hack The Box Walkthrough: Cap (10.10.10.245)
July 15, 2025
My Firebase Webapp almost got pwned by a bot. Then another bot saved it.
July 15, 2025
How to Get Real IPs Through FRP with SafeLine WAF
July 14, 2025
I Trapped Telegram Scammers in an Endless AI Conversation
July 14, 2025
Tryhackme – Cyber Kill Chain
July 13, 2025
CVE-2018-15133: Laravel Deserialization of Untrusted Data Vulnerability
July 13, 2025
Evil-GPT V2 Room | TryHackMe
July 12, 2025
A Letter to a Public Key: Rethinking Email Address Ownership
July 11, 2025
⚠️ AI with a survival instinct? Claude once tried blackmail — now models are lying to avoid being shut down
July 10, 2025
# How to Investigate a Compromised Linux Server
July 9, 2025
🚨 “Google Alert: Someone Just Logged In?” — Don’t Fall for the Phishing Trap
July 9, 2025
🚨 “Google Alert: Someone Just Logged In?” — Don’t Fall for the Phishing Trap
July 9, 2025
How SafeLine WAF Blocks Brute Force Attacks and Protects Your Site
July 8, 2025
The Real Breach Happens After the Login: How Privilege Escalation Fuels Cyber Attacks
July 8, 2025
Everything From Rookie Mistakes to a New Feature: My Passion Project’s Wildest Week
July 7, 2025
Drop Your Web App/API & I’ll Run a Free Security Scan (pentesting) on It
July 4, 2025
The Hidden File That Powers SafeLine WAF: What’s Inside `.env`?
July 4, 2025
How to Avoid False Positives in SafeLine WAF with Custom Rules
July 3, 2025
SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?
July 3, 2025
Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown
July 2, 2025
Tonga cybersecurity attack wake-up call for Pacific, warns expert
July 2, 2025
Пентестинг: основы, преимущества и применение
July 1, 2025
Symfony Command Injection: Risks & Secure Coding
July 1, 2025
AI-Powered Cybersecurity Systems: Attack Prediction Models
June 30, 2025
Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP
June 29, 2025
I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)
June 29, 2025
Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack
June 27, 2025
SSO Security Exposed: Real-World Attack Scenarios in 2025
June 27, 2025
My first portfolio in Figma
June 27, 2025
🛡️ How RedXShield is Changing Africa’s Cybersecurity Game
June 26, 2025
Host Your Own Web Firewall with SafeLine — No Cloud Needed
June 26, 2025
🛡️ Cybersecurity Review Guide for React & Vite Applications
June 25, 2025
From Android Developer to Cybersecurity Beginner: A Public Journey, Not a Hero Story
June 25, 2025
CVE-2021-34523: Microsoft Exchange Server Privilege Escalation Vulnerability
June 24, 2025
CVE-2021-34473: Microsoft Exchange Server Remote Code Execution Vulnerability
June 24, 2025
🔒 Dymo has identified a critical vulnerability affecting the Public Prosecution Office of the Sultanate of Oman
June 22, 2025
Seraphic Security Unveils BrowserTotal™ – Free AI-Powered Browser Security Assessment For Enterprise
June 9, 2025
Want to block websites or test local domains without touching your DNS?
April 14, 2025
Should Iran Bend Knee to Donald Trump?
April 13, 2025
Khai thác lỗ hổng web tự động bằng AI
April 1, 2025
Understanding Secure Communication with Encryption, Hashing, Digital Signatures, and Certificates
March 30, 2025
←
1
2
3
4
5
6
→