Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Master Active Directory: Attacktive Directory (TryHackMe) Walkthrough

Master Active Directory: Attacktive Directory (TryHackMe) Walkthrough

Comments
2 min read
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes
Cover image for Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes

Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes

Comments
3 min read
Purple Teaming, Or: Why Siloed Teams Fail

Purple Teaming, Or: Why Siloed Teams Fail

1
Comments
5 min read
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)
Cover image for Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
I Found a Hidden “Backdoor” in a Client’s WordPress Site

I Found a Hidden “Backdoor” in a Client’s WordPress Site

Comments
4 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly
Cover image for Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
WP Compatibility Patch Backdoor

WP Compatibility Patch Backdoor

Comments
2 min read
The Art of Operational Indistinguishability
Cover image for The Art of Operational Indistinguishability

The Art of Operational Indistinguishability

1
Comments
11 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion
Cover image for Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs
Cover image for Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Comments
2 min read
Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Comments
4 min read
Your Personal Data Economy And How To Shrink It
Cover image for Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
Tech Horror Codex: Vendor Lock‑In
Cover image for Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
Hidden Backdoors & Fake Plugins: How Hackers Live in Your WordPress Dashboard

Hidden Backdoors & Fake Plugins: How Hackers Live in Your WordPress Dashboard

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.