Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Your Personal Data Economy And How To Shrink It
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Jan 1
Your Personal Data Economy And How To Shrink It
#
infosec
#
cybersecurity
Comments
Add Comment
5 min read
OAuth Consent Phishing: When “Allow Access” Becomes the Breach
Daniel Isaac E
Daniel Isaac E
Daniel Isaac E
Follow
Feb 2
OAuth Consent Phishing: When “Allow Access” Becomes the Breach
#
api
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
1 min read
Forensic Analysis: The Unverified Backend of DIVEXA
Nezahualpilli Tlapalco
Nezahualpilli Tlapalco
Nezahualpilli Tlapalco
Follow
Dec 28 '25
Forensic Analysis: The Unverified Backend of DIVEXA
#
digitalforensics
#
infosec
#
divexa
#
cybersecurity
Comments
Add Comment
1 min read
Investigation into Malicious WordPress Core Plugin
MD Pabel
MD Pabel
MD Pabel
Follow
Feb 2
Investigation into Malicious WordPress Core Plugin
#
cybersecurity
#
infosec
#
security
#
wordpress
Comments
Add Comment
2 min read
Practical Identity Protection Without Tools Or Subscriptions
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Dec 27 '25
Practical Identity Protection Without Tools Or Subscriptions
#
cybersecurity
#
infosec
#
identity
Comments
Add Comment
3 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good IntentionsÂ
Mark0
Mark0
Mark0
Follow
Jan 30
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good IntentionsÂ
#
cybersecurity
#
infosec
#
socialengineering
#
microsoft365
1
 reaction
Comments
Add Comment
1 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)
Arashad Dodhiya
Arashad Dodhiya
Arashad Dodhiya
Follow
Dec 24 '25
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)
#
cybersecurity
#
linux
#
infosec
#
learninginpublic
Comments
Add Comment
3 min read
When App Privacy Rules Become Platform Power Levers
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Dec 23 '25
When App Privacy Rules Become Platform Power Levers
#
cybersecurity
#
infosec
Comments
Add Comment
4 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
Tauseef imam
Tauseef imam
Tauseef imam
Follow
Jan 26
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
#
cybersecurity
#
hacker
#
security
#
infosec
1
 reaction
Comments
2
 comments
5 min read
Corporate Wargames: Red Teams vs Blue Teams
Bernie
Bernie
Bernie
Follow
Jan 26
Corporate Wargames: Red Teams vs Blue Teams
#
beginners
#
cybersecurity
#
infosec
#
security
2
 reactions
Comments
Add Comment
3 min read
The USB that Changed Warfare: Lessons from Stuxnet
Ajibola jr. MSc, Cybersecurity
Ajibola jr. MSc, Cybersecurity
Ajibola jr. MSc, Cybersecurity
Follow
Jan 25
The USB that Changed Warfare: Lessons from Stuxnet
#
discuss
#
infosec
#
cybersecurity
#
msccybersecurity
Comments
Add Comment
2 min read
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Jan 23
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
#
cybersecurity
#
websecurity
#
freelancers
#
infosec
4
 reactions
Comments
1
 comment
1 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
Nelson
Nelson
Nelson
Follow
Dec 15 '25
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
#
security
#
infosec
#
opensource
#
cicd
Comments
Add Comment
1 min read
Making Linux Work as a Corporate Desktop
Richard Chamberlain
Richard Chamberlain
Richard Chamberlain
Follow
Jan 18
Making Linux Work as a Corporate Desktop
#
cybersecurity
#
flatpak
#
ostree
#
infosec
2
 reactions
Comments
Add Comment
2 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
Tarek CHEIKH
Tarek CHEIKH
Tarek CHEIKH
Follow
Jan 15
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
#
security
#
awss3
#
aws
#
infosec
Comments
Add Comment
13 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account