Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Comments
3 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Comments
1 min read
Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows
Cover image for Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

1
Comments
4 min read
Understanding Zero Trust: The Future of Cyber security
Cover image for Understanding Zero Trust: The Future of Cyber security

Understanding Zero Trust: The Future of Cyber security

3
Comments
3 min read
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance
Cover image for The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

Comments
8 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network
Cover image for Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)
Cover image for 🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

6
Comments
2 min read
Security Research: Security Vulnerability Investigation

Security Research: Security Vulnerability Investigation

1
Comments
1 min read
DNS: The Hidden Battlefield No One Talks About

DNS: The Hidden Battlefield No One Talks About

1
Comments
2 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project
Cover image for Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

1
Comments
5 min read
The Art of Recon: What Happens When a Target Only Has One Door?
Cover image for The Art of Recon: What Happens When a Target Only Has One Door?

The Art of Recon: What Happens When a Target Only Has One Door?

Comments
4 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025
Cover image for When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
📞 WhatsApp Missed Call Scam — The Call You Should Never Return
Cover image for 📞 WhatsApp Missed Call Scam — The Call You Should Never Return

📞 WhatsApp Missed Call Scam — The Call You Should Never Return

4
Comments 1
4 min read
ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

1
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.