Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Your Personal Data Economy And How To Shrink It
Cover image for Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
OAuth Consent Phishing: When “Allow Access” Becomes the Breach

OAuth Consent Phishing: When “Allow Access” Becomes the Breach

1
Comments
1 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
Investigation into Malicious WordPress Core Plugin

Investigation into Malicious WordPress Core Plugin

Comments
2 min read
Practical Identity Protection Without Tools Or Subscriptions
Cover image for Practical Identity Protection Without Tools Or Subscriptions

Practical Identity Protection Without Tools Or Subscriptions

Comments
3 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

1
Comments
1 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
When App Privacy Rules Become Platform Power Levers
Cover image for When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
Cover image for Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

1
Comments 2
5 min read
Corporate Wargames: Red Teams vs Blue Teams

Corporate Wargames: Red Teams vs Blue Teams

2
Comments
3 min read
The USB that Changed Warfare: Lessons from Stuxnet
Cover image for The USB that Changed Warfare: Lessons from Stuxnet

The USB that Changed Warfare: Lessons from Stuxnet

Comments
2 min read
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
Cover image for Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)

Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)

4
Comments 1
1 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
Cover image for Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
Making Linux Work as a Corporate Desktop
Cover image for Making Linux Work as a Corporate Desktop

Making Linux Work as a Corporate Desktop

2
Comments
2 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.