Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
infosec
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Muhammad Taha Khan
Muhammad Taha Khan
Muhammad Taha Khan
Follow
Oct 20 '25
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
#
security
#
websecurity
#
infosec
Comments
Add Comment
4 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities
SilentWire Cybersecurity
SilentWire Cybersecurity
SilentWire Cybersecurity
Follow
Nov 19 '25
The Real Reason Most Pentests Miss Critical Vulnerabilities
#
cybersecurity
#
infosec
#
cyber
#
career
1
 reaction
Comments
Add Comment
3 min read
Stop AI From Seeing What It Shouldnât: A Practical Guide to PII Safety
Sridhar CR
Sridhar CR
Sridhar CR
Follow
Nov 16 '25
Stop AI From Seeing What It Shouldnât: A Practical Guide to PII Safety
#
ai
#
agents
#
data
#
infosec
2
 reactions
Comments
1
 comment
5 min read
Bug Bounty Hunting for GenAI
ToxSec
ToxSec
ToxSec
Follow
Oct 6 '25
Bug Bounty Hunting for GenAI
#
bugbounty
#
cybersecurity
#
infosec
#
reporting
Comments
Add Comment
8 min read
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
GnomeMan4201
GnomeMan4201
GnomeMan4201
Follow
Nov 9 '25
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
#
cybersecurity
#
redteam
#
infosec
#
offensivesecurity
Comments
Add Comment
5 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Oct 31 '25
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
#
cybersecurity
#
passwords
#
infosec
#
freelancers
1
 reaction
Comments
Add Comment
2 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Giorgi Akhobadze
Giorgi Akhobadze
Giorgi Akhobadze
Follow
Sep 26 '25
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
#
cybersecurity
#
forensics
#
infosec
#
malware
Comments
Add Comment
6 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Sep 24 '25
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
#
nhi
#
infosec
#
security
#
identity
Comments
Add Comment
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Follow
Oct 9 '25
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
#
security
#
devops
#
iot
#
infosec
1
 reaction
Comments
Add Comment
2 min read
Whoâs Who in Cybersecurity: Understanding the Different Types of Threat Actors
NicolĂĄs
NicolĂĄs
NicolĂĄs
Follow
Oct 19 '25
Whoâs Who in Cybersecurity: Understanding the Different Types of Threat Actors
#
cybersecurity
#
beginners
#
infosec
#
security
1
 reaction
Comments
Add Comment
4 min read
Why Your Cybersecurity Strategy Needs AI in 2025
Sagar Sajwan
Sagar Sajwan
Sagar Sajwan
Follow
Oct 24 '25
Why Your Cybersecurity Strategy Needs AI in 2025
#
ai
#
cybersecurity
#
infosec
#
securityautomation
1
 reaction
Comments
1
 comment
10 min read
Industry-Specific Data Security: Protecting Sensitive Data Before Itâs Too Late
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 12 '25
Industry-Specific Data Security: Protecting Sensitive Data Before Itâs Too Late
#
infosec
#
cybersecurity
#
dataprotection
#
dataprivacy
1
 reaction
Comments
Add Comment
3 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 đ)
Keerthika K
Keerthika K
Keerthika K
Follow
Sep 4 '25
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 đ)
#
cybersecurity
#
programming
#
beginners
#
infosec
5
 reactions
Comments
Add Comment
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
Nvidia's AI Kill Chain
ToxSec
ToxSec
ToxSec
Follow
Oct 4 '25
Nvidia's AI Kill Chain
#
ai
#
killchain
#
infosec
#
cybersecurity
Comments
Add Comment
4 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account