Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Claude Code Leak: Why the Harness, Not the Model

Claude Code Leak: Why the Harness, Not the Model

Comments
7 min read
CTF Writeup: PowerAnalysis: Warmup

CTF Writeup: PowerAnalysis: Warmup

Comments
3 min read
How Anomaly Detection Actually Works in Security Operations

How Anomaly Detection Actually Works in Security Operations

Comments
5 min read
I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them

I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them

Comments
8 min read
CTF Writeup Silentium - HTB

CTF Writeup Silentium - HTB

6
Comments
6 min read
# Day 1 – The Biggest Beginner Mistake in SOC: Ignoring Networking 🚀
Cover image for # Day 1 – The Biggest Beginner Mistake in SOC: Ignoring Networking 🚀

# Day 1 – The Biggest Beginner Mistake in SOC: Ignoring Networking 🚀

Comments
2 min read
PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution
Cover image for PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution

PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution

1
Comments
1 min read
2026 Post-Quantum Tunnels: Fighting Harvest Now, Decrypt Later

2026 Post-Quantum Tunnels: Fighting Harvest Now, Decrypt Later

1
Comments
11 min read
AI Chatbot Hack: Two‑Hour Breach Rewrites Security

AI Chatbot Hack: Two‑Hour Breach Rewrites Security

Comments
7 min read
AI Agent Hack: Prompt‑Layer Security Is the Real Threat

AI Agent Hack: Prompt‑Layer Security Is the Real Threat

Comments
7 min read
The Security Crisis Hiding Inside Machine Identities

The Security Crisis Hiding Inside Machine Identities

1
Comments
5 min read
Why Your LLM Probably Has a PII Problem (And How to Fix It)
Cover image for Why Your LLM Probably Has a PII Problem (And How to Fix It)

Why Your LLM Probably Has a PII Problem (And How to Fix It)

2
Comments 2
4 min read
Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️

Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️

Comments
1 min read
Hack The Box - Snapped Writeup
Cover image for Hack The Box - Snapped Writeup

Hack The Box - Snapped Writeup

2
Comments
6 min read
SSRF Attack — When the Server Becomes the Attacker | CAISD

SSRF Attack — When the Server Becomes the Attacker | CAISD

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.