Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Cover image for Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Comments
7 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Comments
1 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
Cover image for Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

1
Comments
3 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
Cover image for Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

5
Comments
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Cover image for Patch Management vs Vulnerability Management: Why the Difference Matters

Patch Management vs Vulnerability Management: Why the Difference Matters

1
Comments
5 min read
Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows
Cover image for Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

3
Comments
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Cover image for Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

2
Comments
3 min read
Dealing With Dependency Vulnerabilities
Cover image for Dealing With Dependency Vulnerabilities

Dealing With Dependency Vulnerabilities

1
Comments
4 min read
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
Cover image for Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?

Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?

1
Comments
2 min read
Security Principles
Cover image for Security Principles

Security Principles

Comments
11 min read
Vulnerability Scanner Overview
Cover image for Vulnerability Scanner Overview

Vulnerability Scanner Overview

Comments
9 min read
Fundamentals of Intrusion Detection Systems (IDS)
Cover image for Fundamentals of Intrusion Detection Systems (IDS)

Fundamentals of Intrusion Detection Systems (IDS)

Comments
8 min read
SIEM (Security Information and Event Management system) - overview
Cover image for SIEM (Security Information and Event Management system) - overview

SIEM (Security Information and Event Management system) - overview

Comments
9 min read
Siber Güvenlik Refleksi: Apache ve CUPS Üzerinde Sızma Testi Süreci / Cybersecurity Reflex: Penetration Testing on Apache & CUPS

Siber Güvenlik Refleksi: Apache ve CUPS Üzerinde Sızma Testi Süreci / Cybersecurity Reflex: Penetration Testing on Apache & CUPS

Comments
2 min read
Understanding Zero Trust: The Future of Cyber security
Cover image for Understanding Zero Trust: The Future of Cyber security

Understanding Zero Trust: The Future of Cyber security

3
Comments
3 min read
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance
Cover image for The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

5
Comments
8 min read
📞 WhatsApp Missed Call Scam — The Call You Should Never Return
Cover image for 📞 WhatsApp Missed Call Scam — The Call You Should Never Return

📞 WhatsApp Missed Call Scam — The Call You Should Never Return

3
Comments
4 min read
HTB - Bastion (Windows)

HTB - Bastion (Windows)

1
Comments
1 min read
🔐 Authentication & Authorization: How to Build a Secure User Login System That Your Users Can Trust
Cover image for 🔐 Authentication & Authorization: How to Build a Secure User Login System That Your Users Can Trust

🔐 Authentication & Authorization: How to Build a Secure User Login System That Your Users Can Trust

1
Comments
3 min read
A Solid Linux Resource I Keep Coming Back To

A Solid Linux Resource I Keep Coming Back To

Comments
1 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network
Cover image for Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯
Cover image for Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

2
Comments
2 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)
Cover image for 🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

6
Comments
2 min read
Security Research: Security Vulnerability Investigation

Security Research: Security Vulnerability Investigation

1
Comments
1 min read
loading...