Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Deepfake Audio Attacks: A New Frontier in Social Engineering
Cover image for Deepfake Audio Attacks: A New Frontier in Social Engineering

Deepfake Audio Attacks: A New Frontier in Social Engineering

Comments
10 min read
Kerberoasting Still Works Because You Trust AES Too Much
Cover image for Kerberoasting Still Works Because You Trust AES Too Much

Kerberoasting Still Works Because You Trust AES Too Much

Comments
7 min read
Malware-Based Attacks: The Undying Threat of the Computer Virus
Cover image for Malware-Based Attacks: The Undying Threat of the Computer Virus

Malware-Based Attacks: The Undying Threat of the Computer Virus

Comments
5 min read
SOC 2 End-to-End Guide (Big 4 Style)

SOC 2 End-to-End Guide (Big 4 Style)

Comments
3 min read
Anyone interested in a free cybersecurity conference + CTF in Korea this July?

Anyone interested in a free cybersecurity conference + CTF in Korea this July?

Comments
1 min read
Week 7

Week 7

Comments
2 min read
Week 6

Week 6

Comments
2 min read
Beyond End-to-End Encryption: How the FBI Recovered "Deleted" Signal Messages

Beyond End-to-End Encryption: How the FBI Recovered "Deleted" Signal Messages

Comments
2 min read
I used a security audit to harden Open Relay instead of shipping another shiny feature

I used a security audit to harden Open Relay instead of shipping another shiny feature

Comments
1 min read
The Day Secrets Were Almost Lost

The Day Secrets Were Almost Lost

Comments
3 min read
Why I built an async recursive engine for OSINT (and why I nearly went insane doing it)
Cover image for Why I built an async recursive engine for OSINT (and why I nearly went insane doing it)

Why I built an async recursive engine for OSINT (and why I nearly went insane doing it)

1
Comments
3 min read
Every Compliance Framework Requires Key Rotation. No Platform Tells You When.
Cover image for Every Compliance Framework Requires Key Rotation. No Platform Tells You When.

Every Compliance Framework Requires Key Rotation. No Platform Tells You When.

Comments
5 min read
Vulnerabities are being exploited faster than ever: opportunity in disguise

Vulnerabities are being exploited faster than ever: opportunity in disguise

Comments
2 min read
Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Comments
1 min read
CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required
Cover image for CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required

CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.