Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations
Cover image for THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

18
Comments
5 min read
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired
Cover image for Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired

Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired

5
Comments
3 min read
Designing a Scalable Multi-Locale Structure for Technical Content: A Practical Case Study

Designing a Scalable Multi-Locale Structure for Technical Content: A Practical Case Study

Comments
1 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing
Cover image for The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
DevSecOps: Modelo de madurez y alternativas de implementación
Cover image for DevSecOps: Modelo de madurez y alternativas de implementación

DevSecOps: Modelo de madurez y alternativas de implementación

5
Comments
10 min read
Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know
Cover image for Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know

Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know

2
Comments
4 min read
Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment
Cover image for Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment

Understanding the ISO/IEC 27000 Series: A Comprehensive Guide to Building a Secure Information Environment

1
Comments 1
5 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Cover image for Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Comments
4 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Cover image for The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

1
Comments 2
4 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities
Cover image for The Real Reason Most Pentests Miss Critical Vulnerabilities

The Real Reason Most Pentests Miss Critical Vulnerabilities

1
Comments
3 min read
Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety

Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety

3
Comments 1
5 min read
I Was Given a “Job Assignment” That Installed Malware
Cover image for I Was Given a “Job Assignment” That Installed Malware

I Was Given a “Job Assignment” That Installed Malware

7
Comments
2 min read
Bug Bounty Hunting for GenAI
Cover image for Bug Bounty Hunting for GenAI

Bug Bounty Hunting for GenAI

Comments
8 min read
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

Comments
5 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

1
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.