Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

Comments
1 min read
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely
Cover image for Stablize Windows By Fixing BIOS, Chipset, And GPU Safely

Stablize Windows By Fixing BIOS, Chipset, And GPU Safely

1
Comments
6 min read
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

1
Comments 1
1 min read
Why Security is Always Late: Economics, Zero-Days, and Attacker Math

Why Security is Always Late: Economics, Zero-Days, and Attacker Math

1
Comments
4 min read
Why Compliance Automation Platforms Can't Solve the Decision Audit Problem

Why Compliance Automation Platforms Can't Solve the Decision Audit Problem

1
Comments 1
4 min read
The First Full-Scale Cyber War: 4 Years of Lessons
Cover image for The First Full-Scale Cyber War: 4 Years of Lessons

The First Full-Scale Cyber War: 4 Years of Lessons

Comments
7 min read
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

3
Comments
2 min read
The Descent Through the Trust Stack
Cover image for The Descent Through the Trust Stack

The Descent Through the Trust Stack

2
Comments
5 min read
Purple Teaming, Or: Why Siloed Teams Fail

Purple Teaming, Or: Why Siloed Teams Fail

1
Comments
5 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly
Cover image for Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps
Cover image for Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Comments
1 min read
OWASP Cornucopia is publishing it’s darkest secrets!
Cover image for OWASP Cornucopia is publishing it’s darkest secrets!

OWASP Cornucopia is publishing it’s darkest secrets!

5
Comments 1
5 min read
Persona Matrices for Authentication and Access Control
Cover image for Persona Matrices for Authentication and Access Control

Persona Matrices for Authentication and Access Control

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.