Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
LDAP Channel Binding and LDAP Signing
Mark0
Mark0
Mark0
Follow
Jan 30
LDAP Channel Binding and LDAP Signing
#
cybersecurity
#
infosec
#
activedirectory
#
ldap
Comments
Add Comment
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
#
cybersecurity
#
infosec
#
malware
#
networksecurity
Comments
Add Comment
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
Mark0
Mark0
Mark0
Follow
Jan 30
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
#
cybersecurity
#
infosec
#
javascript
#
vulnerability
Comments
Add Comment
1 min read
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Feb 12
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely
#
techtalks
#
cybersecurity
#
infosec
#
computerscience
1
 reaction
Comments
Add Comment
6 min read
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing
Liudas
Liudas
Liudas
Follow
Jan 28
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing
#
api
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
1
 comment
1 min read
The First Full-Scale Cyber War: 4 Years of Lessons
Denis Stetskov
Denis Stetskov
Denis Stetskov
Follow
Jan 25
The First Full-Scale Cyber War: 4 Years of Lessons
#
cybersecurity
#
devops
#
infrastructure
#
infosec
Comments
Add Comment
7 min read
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes
Narendrasahoo
Narendrasahoo
Narendrasahoo
Follow
Jan 21
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes
#
cybersecurity
#
infosec
#
datasecurity
Comments
Add Comment
3 min read
Purple Teaming, Or: Why Siloed Teams Fail
Bernie
Bernie
Bernie
Follow
Feb 2
Purple Teaming, Or: Why Siloed Teams Fail
#
cybersecurity
#
devops
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive
Latent Breach
Latent Breach
Latent Breach
Follow
Feb 7
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive
#
cybersecurity
#
infosec
#
security
#
web
6
 reactions
Comments
2
 comments
13 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
Tarek CHEIKH
Tarek CHEIKH
Tarek CHEIKH
Follow
Jan 15
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
#
security
#
awss3
#
aws
#
infosec
Comments
Add Comment
13 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly
Kumar Aditya
Kumar Aditya
Kumar Aditya
Follow
Jan 14
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly
#
cybersecurity
#
infosec
#
darkweb
#
databreach
Comments
Add Comment
2 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps
Michael Errington
Michael Errington
Michael Errington
Follow
Feb 17
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps
#
android
#
infosec
#
cybersecurity
#
cryptography
Comments
Add Comment
1 min read
OWASP Cornucopia is publishing it’s darkest secrets!
Johan Sydseter
Johan Sydseter
Johan Sydseter
Follow
for
OWASP® Foundation
Feb 16
OWASP Cornucopia is publishing it’s darkest secrets!
#
security
#
appsec
#
agile
#
infosec
3
 reactions
Comments
Add Comment
5 min read
Persona Matrices for Authentication and Access Control
Anton Minin Baranovskii
Anton Minin Baranovskii
Anton Minin Baranovskii
Follow
Feb 15
Persona Matrices for Authentication and Access Control
#
authentication
#
security
#
architecture
#
infosec
1
 reaction
Comments
Add Comment
3 min read
How Companies Scan Their Own Networks: A Practical Red Team View with Nmap
Ganesh hari
Ganesh hari
Ganesh hari
Follow
Feb 10
How Companies Scan Their Own Networks: A Practical Red Team View with Nmap
#
cybersecurity
#
infosec
#
networking
#
security
2
 reactions
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account