Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Phising | Advent of Cyber 2025 Day 2 Write-Up

Phising | Advent of Cyber 2025 Day 2 Write-Up

Comments
2 min read
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
Cover image for Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)

Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)

4
Comments 1
1 min read
Advent of Cyber Prep Track | TryHackMe Write-Up

Advent of Cyber Prep Track | TryHackMe Write-Up

Comments
5 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
Cover image for Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
Making Linux Work as a Corporate Desktop
Cover image for Making Linux Work as a Corporate Desktop

Making Linux Work as a Corporate Desktop

2
Comments
2 min read
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)
Cover image for Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
Why VPN Traffic Creates New Security Problems
Cover image for Why VPN Traffic Creates New Security Problems

Why VPN Traffic Creates New Security Problems

Comments 1
3 min read
A Breakdown of Darkweb Exit Scams & Their Warning Signs
Cover image for A Breakdown of Darkweb Exit Scams & Their Warning Signs

A Breakdown of Darkweb Exit Scams & Their Warning Signs

Comments
1 min read
PCI DSS 4.0 Prep for US SaaS Teams
Cover image for PCI DSS 4.0 Prep for US SaaS Teams

PCI DSS 4.0 Prep for US SaaS Teams

Comments
4 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing
Cover image for The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

Comments
1 min read
The Hidden Cost of Free: Why WordPress Nulled Themes Are a Security Nightmare (2025 Guide)

The Hidden Cost of Free: Why WordPress Nulled Themes Are a Security Nightmare (2025 Guide)

Comments
4 min read
Raising Privacy-Smart Kids In An Always-Online World
Cover image for Raising Privacy-Smart Kids In An Always-Online World

Raising Privacy-Smart Kids In An Always-Online World

1
Comments 1
3 min read
The Real Cost Of Letting AI Do Your Thinking For You
Cover image for The Real Cost Of Letting AI Do Your Thinking For You

The Real Cost Of Letting AI Do Your Thinking For You

2
Comments 1
3 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
Cover image for 200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.