Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Triage a Phishing Alert Faster — Without Rebuilding the Process Every Time
Cover image for How to Triage a Phishing Alert Faster — Without Rebuilding the Process Every Time

How to Triage a Phishing Alert Faster — Without Rebuilding the Process Every Time

Comments
5 min read
Quttera Blacklist Removal Case Study: How I Removed a Website from the Quttera Blacklist in 12 Hours

Quttera Blacklist Removal Case Study: How I Removed a Website from the Quttera Blacklist in 12 Hours

Comments
5 min read
From Blueprints to Battlegrounds: My Experience as a Cybersecurity Intern at Anonymous India
Cover image for From Blueprints to Battlegrounds: My Experience as a Cybersecurity Intern at Anonymous India

From Blueprints to Battlegrounds: My Experience as a Cybersecurity Intern at Anonymous India

Comments
2 min read
The Cloud Security Checklist I Use at Every Enterprise Engagement

The Cloud Security Checklist I Use at Every Enterprise Engagement

Comments
2 min read
Common SOC 2 Failures (Real World)

Common SOC 2 Failures (Real World)

Comments
3 min read
I Built an Offline Threat-Hunting CLI in Python — Here's How ThreatLens Catches Real Attacks

I Built an Offline Threat-Hunting CLI in Python — Here's How ThreatLens Catches Real Attacks

1
Comments
3 min read
The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside
Cover image for The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside

The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside

Comments
7 min read
n8n Webhook Abuse: How Legitimate Automation Tools Are Being Turned Into Cyber Weapons
Cover image for n8n Webhook Abuse: How Legitimate Automation Tools Are Being Turned Into Cyber Weapons

n8n Webhook Abuse: How Legitimate Automation Tools Are Being Turned Into Cyber Weapons

Comments
3 min read
Information Security Concepts Explained: Risk, Vulnerabilities, Threats & Controls (2026)

Information Security Concepts Explained: Risk, Vulnerabilities, Threats & Controls (2026)

Comments
10 min read
Cyblack internship Ethical hacking sprint write-up
Cover image for Cyblack internship Ethical hacking sprint write-up

Cyblack internship Ethical hacking sprint write-up

Comments
3 min read
Deepfake Audio Attacks: A New Frontier in Social Engineering
Cover image for Deepfake Audio Attacks: A New Frontier in Social Engineering

Deepfake Audio Attacks: A New Frontier in Social Engineering

Comments
10 min read
Kerberoasting Still Works Because You Trust AES Too Much
Cover image for Kerberoasting Still Works Because You Trust AES Too Much

Kerberoasting Still Works Because You Trust AES Too Much

Comments
7 min read
Malware-Based Attacks: The Undying Threat of the Computer Virus
Cover image for Malware-Based Attacks: The Undying Threat of the Computer Virus

Malware-Based Attacks: The Undying Threat of the Computer Virus

Comments
5 min read
SOC 2 End-to-End Guide (Big 4 Style)

SOC 2 End-to-End Guide (Big 4 Style)

Comments
3 min read
Anyone interested in a free cybersecurity conference + CTF in Korea this July?

Anyone interested in a free cybersecurity conference + CTF in Korea this July?

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.