Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Copy Fail (CVE-2026-31431)

Copy Fail (CVE-2026-31431)

Comments
8 min read
The Silent Heist: How Cryptojackers Stole Millions Without Anyone Noticing

The Silent Heist: How Cryptojackers Stole Millions Without Anyone Noticing

Comments
8 min read
Metasploitable2 - FTP Exploitation using vsftpd 2.3.4 Backdoor

Metasploitable2 - FTP Exploitation using vsftpd 2.3.4 Backdoor

Comments
2 min read
How I Mapped an International Pig Butchering Network Using Public Tools
Cover image for How I Mapped an International Pig Butchering Network Using Public Tools

How I Mapped an International Pig Butchering Network Using Public Tools

Comments
9 min read
Trust as a Vector What the EtherRAT Campaign Reveals About Security's Blind Spot
Cover image for Trust as a Vector What the EtherRAT Campaign Reveals About Security's Blind Spot

Trust as a Vector What the EtherRAT Campaign Reveals About Security's Blind Spot

Comments
4 min read
Why Bangladesh Needs GRC-Offensive Security Professionals in 2026

Why Bangladesh Needs GRC-Offensive Security Professionals in 2026

Comments
3 min read
HTB – AD Enumeration & Attacks – Skills Assessment Part I - Walkthrough - without Metasploit
Cover image for HTB – AD Enumeration & Attacks – Skills Assessment Part I - Walkthrough - without Metasploit

HTB – AD Enumeration & Attacks – Skills Assessment Part I - Walkthrough - without Metasploit

Comments
19 min read
I Ran a Honeypot for a Week. The Results Were Shocking.

I Ran a Honeypot for a Week. The Results Were Shocking.

Comments
5 min read
Cybersecurity in AWS
Cover image for Cybersecurity in AWS

Cybersecurity in AWS

1
Comments
8 min read
Day 3 Learning How Data Actually Moves (TCP/IP, TCP vs UDP, DHCP)
Cover image for Day 3 Learning How Data Actually Moves (TCP/IP, TCP vs UDP, DHCP)

Day 3 Learning How Data Actually Moves (TCP/IP, TCP vs UDP, DHCP)

Comments
1 min read
Safely Handling Malware Samples for API Testing
Cover image for Safely Handling Malware Samples for API Testing

Safely Handling Malware Samples for API Testing

Comments
20 min read
Why Scam Campaigns Should Be Understood from Contact to Loss

Why Scam Campaigns Should Be Understood from Contact to Loss

Comments
6 min read
RF Intelligence: The Attack Surface Your SIEM Can't See
Cover image for RF Intelligence: The Attack Surface Your SIEM Can't See

RF Intelligence: The Attack Surface Your SIEM Can't See

Comments
4 min read
OpenEMR 38-Vulnerability Chain: Patient Data Exfil & Tampering
Cover image for OpenEMR 38-Vulnerability Chain: Patient Data Exfil & Tampering

OpenEMR 38-Vulnerability Chain: Patient Data Exfil & Tampering

Comments
5 min read
Email Spoofing vs AI Messaging: What's Changing in 2026
Cover image for Email Spoofing vs AI Messaging: What's Changing in 2026

Email Spoofing vs AI Messaging: What's Changing in 2026

Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.