Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Vulnerability Scanner Overview
Cover image for Vulnerability Scanner Overview

Vulnerability Scanner Overview

Comments
9 min read
Security Principles
Cover image for Security Principles

Security Principles

Comments
11 min read
Fundamentals of Intrusion Detection Systems (IDS)
Cover image for Fundamentals of Intrusion Detection Systems (IDS)

Fundamentals of Intrusion Detection Systems (IDS)

Comments
8 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Comments
1 min read
SIEM (Security Information and Event Management system) - overview
Cover image for SIEM (Security Information and Event Management system) - overview

SIEM (Security Information and Event Management system) - overview

Comments
9 min read
Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows
Cover image for Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

1
Comments
4 min read
Siber Güvenlik Refleksi: Apache ve CUPS Üzerinde Sızma Testi Süreci / Cybersecurity Reflex: Penetration Testing on Apache & CUPS

Siber Güvenlik Refleksi: Apache ve CUPS Üzerinde Sızma Testi Süreci / Cybersecurity Reflex: Penetration Testing on Apache & CUPS

Comments
2 min read
Understanding Zero Trust: The Future of Cyber security
Cover image for Understanding Zero Trust: The Future of Cyber security

Understanding Zero Trust: The Future of Cyber security

3
Comments
3 min read
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance
Cover image for The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

Comments
8 min read
🔐 Authentication & Authorization: How to Build a Secure User Login System That Your Users Can Trust
Cover image for 🔐 Authentication & Authorization: How to Build a Secure User Login System That Your Users Can Trust

🔐 Authentication & Authorization: How to Build a Secure User Login System That Your Users Can Trust

1
Comments
3 min read
A Solid Linux Resource I Keep Coming Back To

A Solid Linux Resource I Keep Coming Back To

Comments
1 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network
Cover image for Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯
Cover image for Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

14
Comments 1
2 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)
Cover image for 🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

6
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.