Learn
Anything
Online
Filter by Type
Articles
5
Videos
1
Websites
4
Filter by Subtopic
Application Security
1
Beginner
1
Blockchain
1
Case Studies
1
ChatGPT
1
Cheat Sheets
1
Cloudflare
1
Data Breaches
1
Data Exfiltration
1
Internet
1
Linux
1
Malware
1
News
1
OpenID Connect (OIDC)
1
Phishing
1
Prompt Injection
1
Ransomware
1
Reconnaissance
1
SSH
1
SSH Keys
1
Security
1
Servers
3
Single Sign-On (SSO)
1
Social Media
1
WAF
1
Submit
Open menu
Learn
Anything
Online
Toggle theme
Scroll to top
Home
Cyber Security
Articles
Toggle theme
5 Best Cyber Security Articles
Learn Anything Online features the best articles for learning about cyber security. Learn from the best resources on the web, curated by us to ensure the highest quality.
Free
Added 4 months ago
What Is a Crypto Wallet?
Revoke.cash
Learn what a crypto wallet is, the different types, account abstraction and how to choose the right wallet.
Beginner
· Blockchain
Free
Added 4 months ago
Cloudflare WAF Rules V3
Web Hero Agency
Learn to create some custom firewall rules on Cloudflare to help protect your site from bots, spammers, hackers, etc. This is a great starting point and can be achieved on the free tier.
Cloudflare
· WAF
Free
Added 4 months ago
Spyware Injection Into Your ChatGPT's Long-Term Memory (SpAIware)
Johann Rehberger
This post explains an attack chain for the ChatGPT macOS application. Through prompt injection from untrusted data, attackers could insert long-term persistent spyware into ChatGPT’s memory. This led to continuous data exfiltration of any information the user typed or responses received by ChatGPT, including any future chat sessions.
ChatGPT
· Prompt Injection
· Security
Free
Added 6 months ago
DIY Single Sign-On for SSH
Carl Tashian
Learn to set up Google single sign-on (SSO) for SSH using OpenID Connect (OIDC), short-lived SSH certificates, and Smallstep's step-ca and step packages. Create an SSH Certificate Authority to bootstrap a new host and user. Though it requires more initial effort than a typical SSH key setup, this method simplifies key management by eliminating the need for managing authorized_keys files and offers additional benefits beyond SSO.
OpenID Connect (OIDC)
· SSH
· Single Sign-On (SSO)
Free
Added 6 months ago
How to properly manage ssh keys for server access
Marc Päpper
How do you manage SSH keys when a developer leaves a company? Marc explores a solution that avoids having a single point of failure that is commonly found with commercial and open-source solutions.
SSH Keys
· Servers
Topics
Artificial Intelligence
Coding
Corporate Jobs
Cyber Security
Entrepreneurship
Self-Hosting
Tech Careers
Made by
@indiehackerman