Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Comments
1 min read
CVE-2021-3156 analysis.

CVE-2021-3156 analysis.

Comments
2 min read
1 little known secret of CompatTelRunner.exe

1 little known secret of CompatTelRunner.exe

Comments
1 min read
WinHttpOpen user agents

WinHttpOpen user agents

Comments
1 min read
Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval

Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval

Comments
4 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
FullAgenticStack WhatsApp-first: RFC-WF-0009
Cover image for FullAgenticStack WhatsApp-first: RFC-WF-0009

FullAgenticStack WhatsApp-first: RFC-WF-0009

1
Comments
6 min read
Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass
Cover image for Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass

Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass

Comments
1 min read
5 Cybersecurity Habits Every Internet User Should Have
Cover image for 5 Cybersecurity Habits Every Internet User Should Have

5 Cybersecurity Habits Every Internet User Should Have

1
Comments
2 min read
What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)
Cover image for What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)

What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)

Comments
2 min read
Why Windows Crashes and How To Build Stable PCs
Cover image for Why Windows Crashes and How To Build Stable PCs

Why Windows Crashes and How To Build Stable PCs

Comments
7 min read
How Can Alertable Threads and APC Abuse Lead to System Crash

How Can Alertable Threads and APC Abuse Lead to System Crash

Comments
3 min read
The Importance of International Cybersecurity Alliances and Cooperation
Cover image for The Importance of International Cybersecurity Alliances and Cooperation

The Importance of International Cybersecurity Alliances and Cooperation

Comments
5 min read
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
OAuth Consent Phishing: When “Allow Access” Becomes the Breach

OAuth Consent Phishing: When “Allow Access” Becomes the Breach

1
Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.