Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
DevSecOps: Modelo de madurez y alternativas de implementación
Cover image for DevSecOps: Modelo de madurez y alternativas de implementación

DevSecOps: Modelo de madurez y alternativas de implementación

5
Comments
10 min read
Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment
Cover image for Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment

Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment

1
Comments 1
5 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Cover image for Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Comments
4 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

1
Comments
2 min read
Bug Bounty Hunting for GenAI
Cover image for Bug Bounty Hunting for GenAI

Bug Bounty Hunting for GenAI

Comments
8 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Cover image for Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Comments
6 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Cover image for Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Comments
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)

How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)

1
Comments
2 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

1
Comments
4 min read
Why Your Cybersecurity Strategy Needs AI in 2025
Cover image for Why Your Cybersecurity Strategy Needs AI in 2025

Why Your Cybersecurity Strategy Needs AI in 2025

1
Comments 1
10 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
Cover image for Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

1
Comments
3 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
Cover image for Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

5
Comments
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Cover image for Patch Management vs Vulnerability Management: Why the Difference Matters

Patch Management vs Vulnerability Management: Why the Difference Matters

1
Comments
5 min read
Nvidia's AI Kill Chain
Cover image for Nvidia's AI Kill Chain

Nvidia's AI Kill Chain

Comments
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Cover image for Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

2
Comments
3 min read
Dealing With Dependency Vulnerabilities
Cover image for Dealing With Dependency Vulnerabilities

Dealing With Dependency Vulnerabilities

Comments
4 min read
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
Cover image for Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?

Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?

1
Comments
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Comments
3 min read
Security Principles
Cover image for Security Principles

Security Principles

Comments
11 min read
Vulnerability Scanner Overview
Cover image for Vulnerability Scanner Overview

Vulnerability Scanner Overview

Comments
9 min read
Fundamentals of Intrusion Detection Systems (IDS)
Cover image for Fundamentals of Intrusion Detection Systems (IDS)

Fundamentals of Intrusion Detection Systems (IDS)

Comments
8 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Comments
1 min read
SIEM (Security Information and Event Management system) - overview
Cover image for SIEM (Security Information and Event Management system) - overview

SIEM (Security Information and Event Management system) - overview

Comments
9 min read
Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows
Cover image for Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

1
Comments
4 min read
loading...