Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

Comments
1 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities
Cover image for The Real Reason Most Pentests Miss Critical Vulnerabilities

The Real Reason Most Pentests Miss Critical Vulnerabilities

1
Comments
3 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
Cover image for 200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Cover image for The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
I Was Given a “Job Assignment” That Installed Malware
Cover image for I Was Given a “Job Assignment” That Installed Malware

I Was Given a “Job Assignment” That Installed Malware

3
Comments
2 min read
DevSecOps: Modelo de madurez y alternativas de implementación
Cover image for DevSecOps: Modelo de madurez y alternativas de implementación

DevSecOps: Modelo de madurez y alternativas de implementación

5
Comments
10 min read
Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment
Cover image for Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment

Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment

1
Comments 1
5 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Cover image for Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Comments
4 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

1
Comments
2 min read
Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety

Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety

2
Comments
5 min read
Bug Bounty Hunting for GenAI
Cover image for Bug Bounty Hunting for GenAI

Bug Bounty Hunting for GenAI

Comments
8 min read
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

Comments
5 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Cover image for Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Comments
6 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Cover image for Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Comments
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)

How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)

1
Comments
2 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

1
Comments
4 min read
Why Your Cybersecurity Strategy Needs AI in 2025
Cover image for Why Your Cybersecurity Strategy Needs AI in 2025

Why Your Cybersecurity Strategy Needs AI in 2025

1
Comments 1
10 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
Cover image for Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

1
Comments
3 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
Cover image for Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

5
Comments
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Cover image for Patch Management vs Vulnerability Management: Why the Difference Matters

Patch Management vs Vulnerability Management: Why the Difference Matters

1
Comments
5 min read
Nvidia's AI Kill Chain
Cover image for Nvidia's AI Kill Chain

Nvidia's AI Kill Chain

Comments
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Cover image for Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

2
Comments
3 min read
Dealing With Dependency Vulnerabilities
Cover image for Dealing With Dependency Vulnerabilities

Dealing With Dependency Vulnerabilities

Comments
4 min read
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
Cover image for Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?

Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?

1
Comments
2 min read
loading...