Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
infosec
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
GnomeMan4201
GnomeMan4201
GnomeMan4201
Follow
Nov 9 '25
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
#
cybersecurity
#
redteam
#
infosec
#
offensivesecurity
Comments
Add Comment
5 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Oct 31 '25
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
#
cybersecurity
#
passwords
#
infosec
#
freelancers
1
reaction
Comments
Add Comment
2 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Giorgi Akhobadze
Giorgi Akhobadze
Giorgi Akhobadze
Follow
Sep 26 '25
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
#
cybersecurity
#
forensics
#
infosec
#
malware
Comments
Add Comment
6 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Sep 24 '25
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
#
nhi
#
infosec
#
security
#
identity
Comments
Add Comment
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Follow
Oct 9 '25
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
#
security
#
devops
#
iot
#
infosec
1
reaction
Comments
Add Comment
2 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors
Nicolás
Nicolás
Nicolás
Follow
Oct 19 '25
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors
#
cybersecurity
#
beginners
#
infosec
#
security
1
reaction
Comments
Add Comment
4 min read
Why Your Cybersecurity Strategy Needs AI in 2025
Sagar Sajwan
Sagar Sajwan
Sagar Sajwan
Follow
Oct 24 '25
Why Your Cybersecurity Strategy Needs AI in 2025
#
ai
#
cybersecurity
#
infosec
#
securityautomation
1
reaction
Comments
1
comment
10 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 12 '25
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
#
infosec
#
cybersecurity
#
dataprotection
#
dataprivacy
1
reaction
Comments
Add Comment
3 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
Keerthika K
Keerthika K
Keerthika K
Follow
Sep 4 '25
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
#
cybersecurity
#
programming
#
beginners
#
infosec
5
reactions
Comments
Add Comment
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
reaction
Comments
Add Comment
5 min read
Nvidia's AI Kill Chain
ToxSec
ToxSec
ToxSec
Follow
Oct 4 '25
Nvidia's AI Kill Chain
#
ai
#
killchain
#
infosec
#
cybersecurity
Comments
Add Comment
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 13 '25
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
#
infosec
#
cybersecurity
#
webdev
#
dataprivacy
2
reactions
Comments
Add Comment
3 min read
Dealing With Dependency Vulnerabilities
Buffolander
Buffolander
Buffolander
Follow
Aug 31 '25
Dealing With Dependency Vulnerabilities
#
infosec
#
vulnerabilities
#
node
Comments
Add Comment
4 min read
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
Yasmine Boussena
Yasmine Boussena
Yasmine Boussena
Follow
Sep 19 '25
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
#
cybersecurity
#
infosec
#
devops
#
technology
1
reaction
Comments
Add Comment
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
Dogan
Dogan
Dogan
Follow
Sep 24 '25
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
3 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account