Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
infosec
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Why Your Cybersecurity Strategy Needs AI in 2025
Sagar Sajwan
Sagar Sajwan
Sagar Sajwan
Follow
Oct 24 '25
Why Your Cybersecurity Strategy Needs AI in 2025
#
ai
#
cybersecurity
#
infosec
#
securityautomation
1
 reaction
Comments
1
 comment
10 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 12 '25
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
#
infosec
#
cybersecurity
#
dataprotection
#
dataprivacy
1
 reaction
Comments
Add Comment
3 min read
WordPress Hacked: Fake Cloudflare “Verify You Are Human” — A WordPress Malware Removal Case Study
MD Pabel
MD Pabel
MD Pabel
Follow
Feb 2
WordPress Hacked: Fake Cloudflare “Verify You Are Human” — A WordPress Malware Removal Case Study
#
cybersecurity
#
infosec
#
security
#
wordpress
Comments
Add Comment
5 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
Keerthika K
Keerthika K
Keerthika K
Follow
Sep 4 '25
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
#
cybersecurity
#
programming
#
beginners
#
infosec
5
 reactions
Comments
Add Comment
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
Nvidia's AI Kill Chain
ToxSec
ToxSec
ToxSec
Follow
Oct 4 '25
Nvidia's AI Kill Chain
#
ai
#
killchain
#
infosec
#
cybersecurity
Comments
Add Comment
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 13 '25
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
#
infosec
#
cybersecurity
#
webdev
#
dataprivacy
2
 reactions
Comments
Add Comment
3 min read
Dealing With Dependency Vulnerabilities
Buffolander
Buffolander
Buffolander
Follow
Aug 31 '25
Dealing With Dependency Vulnerabilities
#
infosec
#
vulnerabilities
#
node
Comments
Add Comment
4 min read
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
Yasmine Boussena
Yasmine Boussena
Yasmine Boussena
Follow
Sep 19 '25
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
#
cybersecurity
#
infosec
#
devops
#
technology
1
 reaction
Comments
Add Comment
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
Dogan
Dogan
Dogan
Follow
Sep 24 '25
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
3 min read
Security Principles
Mohamed Adan Daud
Mohamed Adan Daud
Mohamed Adan Daud
Follow
Aug 15 '25
Security Principles
#
cybersecurity
#
infosec
#
security
#
moh4med404
Comments
Add Comment
11 min read
Vulnerability Scanner Overview
Mohamed Adan Daud
Mohamed Adan Daud
Mohamed Adan Daud
Follow
Aug 15 '25
Vulnerability Scanner Overview
#
cybersecurity
#
infosec
#
vulnerabilityscanner
#
moh4med404
Comments
Add Comment
9 min read
Fundamentals of Intrusion Detection Systems (IDS)
Mohamed Adan Daud
Mohamed Adan Daud
Mohamed Adan Daud
Follow
Aug 15 '25
Fundamentals of Intrusion Detection Systems (IDS)
#
cybersecurity
#
infosec
#
ids
#
moh4med404
Comments
Add Comment
8 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Sep 18 '25
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series
#
cybersecurity
#
ai
#
infosec
#
weeklyseries
Comments
Add Comment
1 min read
SIEM (Security Information and Event Management system) - overview
Mohamed Adan Daud
Mohamed Adan Daud
Mohamed Adan Daud
Follow
Aug 14 '25
SIEM (Security Information and Event Management system) - overview
#
siem
#
cybersecurity
#
infosec
#
moh4med404
Comments
Add Comment
9 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account