Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Your Personal Data Economy And How To Shrink It
Cover image for Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
Tech Horror Codex: Vendor Lock‑In
Cover image for Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
Practical Identity Protection Without Tools Or Subscriptions
Cover image for Practical Identity Protection Without Tools Or Subscriptions

Practical Identity Protection Without Tools Or Subscriptions

Comments
3 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
Social Media Safety In A Permanent Online World
Cover image for Social Media Safety In A Permanent Online World

Social Media Safety In A Permanent Online World

Comments
4 min read
When App Privacy Rules Become Platform Power Levers
Cover image for When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Online Scams Targeting Older Adults And How To Stop Them
Cover image for Online Scams Targeting Older Adults And How To Stop Them

Online Scams Targeting Older Adults And How To Stop Them

Comments
3 min read
Cybersecurity Weekly#12: What Developers Should Care About This Week
Cover image for Cybersecurity Weekly#12: What Developers Should Care About This Week

Cybersecurity Weekly#12: What Developers Should Care About This Week

1
Comments
2 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
Cover image for Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
Why VPN Traffic Creates New Security Problems
Cover image for Why VPN Traffic Creates New Security Problems

Why VPN Traffic Creates New Security Problems

Comments 1
3 min read
A Breakdown of Darkweb Exit Scams & Their Warning Signs
Cover image for A Breakdown of Darkweb Exit Scams & Their Warning Signs

A Breakdown of Darkweb Exit Scams & Their Warning Signs

Comments
1 min read
PCI DSS 4.0 Prep for US SaaS Teams
Cover image for PCI DSS 4.0 Prep for US SaaS Teams

PCI DSS 4.0 Prep for US SaaS Teams

Comments
4 min read
Designing a Scalable Multi-Locale Structure for Technical Content: A Practical Case Study

Designing a Scalable Multi-Locale Structure for Technical Content: A Practical Case Study

Comments
1 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing
Cover image for The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

Comments
1 min read
Raising Privacy-Smart Kids In An Always-Online World
Cover image for Raising Privacy-Smart Kids In An Always-Online World

Raising Privacy-Smart Kids In An Always-Online World

Comments
3 min read
The Real Cost Of Letting AI Do Your Thinking For You
Cover image for The Real Cost Of Letting AI Do Your Thinking For You

The Real Cost Of Letting AI Do Your Thinking For You

2
Comments 1
3 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
Cover image for 200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Cover image for The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Why Most Organizations Fail at Cybersecurity — Even After Heavy Investment

Why Most Organizations Fail at Cybersecurity — Even After Heavy Investment

1
Comments
2 min read
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

5
Comments
4 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations
Cover image for THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

16
Comments
5 min read
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired
Cover image for Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired

Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired

5
Comments
3 min read
loading...