Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

Comments
1 min read
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely
Cover image for Stablize Windows By Fixing BIOS, Chipset, And GPU Safely

Stablize Windows By Fixing BIOS, Chipset, And GPU Safely

1
Comments
6 min read
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

1
Comments 1
1 min read
The First Full-Scale Cyber War: 4 Years of Lessons
Cover image for The First Full-Scale Cyber War: 4 Years of Lessons

The First Full-Scale Cyber War: 4 Years of Lessons

Comments
7 min read
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes
Cover image for Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes

Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes

Comments
3 min read
Purple Teaming, Or: Why Siloed Teams Fail

Purple Teaming, Or: Why Siloed Teams Fail

1
Comments
5 min read
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

6
Comments 2
13 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly
Cover image for Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps
Cover image for Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Comments
1 min read
OWASP Cornucopia is publishing it’s darkest secrets!
Cover image for OWASP Cornucopia is publishing it’s darkest secrets!

OWASP Cornucopia is publishing it’s darkest secrets!

3
Comments
5 min read
Persona Matrices for Authentication and Access Control
Cover image for Persona Matrices for Authentication and Access Control

Persona Matrices for Authentication and Access Control

1
Comments
3 min read
How Companies Scan Their Own Networks: A Practical Red Team View with Nmap
Cover image for How Companies Scan Their Own Networks: A Practical Red Team View with Nmap

How Companies Scan Their Own Networks: A Practical Red Team View with Nmap

2
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.