Forem

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🛑 Don’t Scan That Code: The Rise of QR Code Phishing Scams
Cover image for 🛑 Don’t Scan That Code: The Rise of QR Code Phishing Scams

🛑 Don’t Scan That Code: The Rise of QR Code Phishing Scams

3
Comments
4 min read
🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

12
Comments 3
2 min read
Troubleshooting AWS API Gateway VPC Link with Network Load Balancer

Troubleshooting AWS API Gateway VPC Link with Network Load Balancer

Comments
7 min read
Resillion — when those who preach cybersecurity forget to practice it

Resillion — when those who preach cybersecurity forget to practice it

1
Comments
5 min read
Interview With Author Ahmed Awad ( NullC0d3 )

Interview With Author Ahmed Awad ( NullC0d3 )

Comments
3 min read
Cipher's Log: Introduction
Cover image for Cipher's Log: Introduction

Cipher's Log: Introduction

Comments
2 min read
NoSQL Injection: Understanding the Threat and How to Defend Against It

NoSQL Injection: Understanding the Threat and How to Defend Against It

5
Comments
3 min read
✈️ Qantas Cyberattack Exposes 6 Million Passenger Records: A Wake-Up Call for the Aviation Industry
Cover image for ✈️ Qantas Cyberattack Exposes 6 Million Passenger Records: A Wake-Up Call for the Aviation Industry

✈️ Qantas Cyberattack Exposes 6 Million Passenger Records: A Wake-Up Call for the Aviation Industry

3
Comments
4 min read
Final Tale: Part 3 - The Gateways We Left Open
Cover image for Final Tale: Part 3 - The Gateways We Left Open

Final Tale: Part 3 - The Gateways We Left Open

5
Comments
5 min read
Zero-Day Exploits in 2025: Detection, Prevention, and Response Strategies
Cover image for Zero-Day Exploits in 2025: Detection, Prevention, and Response Strategies

Zero-Day Exploits in 2025: Detection, Prevention, and Response Strategies

1
Comments
3 min read
วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

Comments 1
1 min read
Пентестинг: основы, преимущества и применение
Cover image for Пентестинг: основы, преимущества и применение

Пентестинг: основы, преимущества и применение

1
Comments
1 min read
I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)
Cover image for I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

3
Comments
1 min read
Best WAF for Beginners in 2025: Why SafeLine Beats Traditional WAFs

Best WAF for Beginners in 2025: Why SafeLine Beats Traditional WAFs

5
Comments
3 min read
🔐 "They Got Our Data… But It Was All Encrypted Garbage."
Cover image for 🔐 "They Got Our Data… But It Was All Encrypted Garbage."

🔐 "They Got Our Data… But It Was All Encrypted Garbage."

1
Comments
3 min read
ประวัติศาสตร์และมาตรฐานของความปลอดภัยไซเบอร์ (Cybersecurity)

ประวัติศาสตร์และมาตรฐานของความปลอดภัยไซเบอร์ (Cybersecurity)

1
Comments
1 min read
Solving TryHackMe's "Vulnerability Capstone" Room - A Complete Walkthrough
Cover image for Solving TryHackMe's "Vulnerability Capstone" Room - A Complete Walkthrough

Solving TryHackMe's "Vulnerability Capstone" Room - A Complete Walkthrough

1
Comments
3 min read
CISA: Real-world Information Systems Auditing
Cover image for CISA: Real-world Information Systems Auditing

CISA: Real-world Information Systems Auditing

Comments
2 min read
Git Tales: Secrets in the Shadows
Cover image for Git Tales: Secrets in the Shadows

Git Tales: Secrets in the Shadows

2
Comments
3 min read
อุตสาหกรรมความปลอดภัยทางไซเบอร์ (Cybersecurity Industry)

อุตสาหกรรมความปลอดภัยทางไซเบอร์ (Cybersecurity Industry)

Comments 1
1 min read
🚀 Back online – and getting ready for what’s next.

🚀 Back online – and getting ready for what’s next.

Comments 1
1 min read
India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

Comments
2 min read
So They Asked for Your Security Certs — Now What?

So They Asked for Your Security Certs — Now What?

Comments
2 min read
Git Tales: Part 2 - Demons in the Cloud
Cover image for Git Tales: Part 2 - Demons in the Cloud

Git Tales: Part 2 - Demons in the Cloud

3
Comments
5 min read
Cybersecurity 101: Why Digital Safety Is Everyone’s Business

Cybersecurity 101: Why Digital Safety Is Everyone’s Business

Comments
1 min read
loading...