Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Making Linux Work as a Corporate Desktop
Cover image for Making Linux Work as a Corporate Desktop

Making Linux Work as a Corporate Desktop

Comments
2 min read
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)
Cover image for Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly
Cover image for Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion
Cover image for Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs
Cover image for Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Comments
2 min read
Your Personal Data Economy And How To Shrink It
Cover image for Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
Tech Horror Codex: Vendor Lock‑In
Cover image for Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
Practical Identity Protection Without Tools Or Subscriptions
Cover image for Practical Identity Protection Without Tools Or Subscriptions

Practical Identity Protection Without Tools Or Subscriptions

Comments
3 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
Social Media Safety In A Permanent Online World
Cover image for Social Media Safety In A Permanent Online World

Social Media Safety In A Permanent Online World

Comments
4 min read
When App Privacy Rules Become Platform Power Levers
Cover image for When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Online Scams Targeting Older Adults And How To Stop Them
Cover image for Online Scams Targeting Older Adults And How To Stop Them

Online Scams Targeting Older Adults And How To Stop Them

Comments
3 min read
Cybersecurity Weekly#12: What Developers Should Care About This Week
Cover image for Cybersecurity Weekly#12: What Developers Should Care About This Week

Cybersecurity Weekly#12: What Developers Should Care About This Week

1
Comments
2 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
Cover image for Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
Why VPN Traffic Creates New Security Problems
Cover image for Why VPN Traffic Creates New Security Problems

Why VPN Traffic Creates New Security Problems

Comments 1
3 min read
A Breakdown of Darkweb Exit Scams & Their Warning Signs
Cover image for A Breakdown of Darkweb Exit Scams & Their Warning Signs

A Breakdown of Darkweb Exit Scams & Their Warning Signs

Comments
1 min read
PCI DSS 4.0 Prep for US SaaS Teams
Cover image for PCI DSS 4.0 Prep for US SaaS Teams

PCI DSS 4.0 Prep for US SaaS Teams

Comments
4 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing
Cover image for The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

Comments
1 min read
Raising Privacy-Smart Kids In An Always-Online World
Cover image for Raising Privacy-Smart Kids In An Always-Online World

Raising Privacy-Smart Kids In An Always-Online World

1
Comments 1
3 min read
The Real Cost Of Letting AI Do Your Thinking For You
Cover image for The Real Cost Of Letting AI Do Your Thinking For You

The Real Cost Of Letting AI Do Your Thinking For You

2
Comments 1
3 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
Cover image for 200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Cover image for The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
loading...