Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
TCP/IP Stack & Packet Anatomy: The Foundation Every Security Professional Must Master

TCP/IP Stack & Packet Anatomy: The Foundation Every Security Professional Must Master

Comments
26 min read
Week 7

Week 7

Comments
2 min read
Week 6

Week 6

Comments
2 min read
The Power of Prediction: Machine Learning for Ransomware Prevention

The Power of Prediction: Machine Learning for Ransomware Prevention

Comments
2 min read
Top 5 Malware Types I Keep Finding on Hacked WordPress Sites

Top 5 Malware Types I Keep Finding on Hacked WordPress Sites

Comments
8 min read
I used a security audit to harden Open Relay instead of shipping another shiny feature

I used a security audit to harden Open Relay instead of shipping another shiny feature

Comments
1 min read
The Day Secrets Were Almost Lost

The Day Secrets Were Almost Lost

Comments
3 min read
Cybersecurity Is Not Just About Attacks Anymore: Why Law, Trust, and Governance Define the Next Era of Security
Cover image for Cybersecurity Is Not Just About Attacks Anymore: Why Law, Trust, and Governance Define the Next Era of Security

Cybersecurity Is Not Just About Attacks Anymore: Why Law, Trust, and Governance Define the Next Era of Security

1
Comments
4 min read
Why I built an async recursive engine for OSINT (and why I nearly went insane doing it)
Cover image for Why I built an async recursive engine for OSINT (and why I nearly went insane doing it)

Why I built an async recursive engine for OSINT (and why I nearly went insane doing it)

1
Comments
3 min read
Every Compliance Framework Requires Key Rotation. No Platform Tells You When.
Cover image for Every Compliance Framework Requires Key Rotation. No Platform Tells You When.

Every Compliance Framework Requires Key Rotation. No Platform Tells You When.

Comments
5 min read
Vulnerabities are being exploited faster than ever: opportunity in disguise

Vulnerabities are being exploited faster than ever: opportunity in disguise

Comments
2 min read
Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Comments
1 min read
CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required
Cover image for CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required

CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required

Comments
2 min read
A laughing RAT: CrystalX combines spyware, stealer, and prankware features

A laughing RAT: CrystalX combines spyware, stealer, and prankware features

Comments
1 min read
Prioritizing Risk: Why Context Matters in API Security

Prioritizing Risk: Why Context Matters in API Security

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.