Forem

# infosec

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network
Cover image for Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
Passed the Hackviser CAPT Certification โ€“ My Module-by-Module Experience ๐ŸŽฏ
Cover image for Passed the Hackviser CAPT Certification โ€“ My Module-by-Module Experience ๐ŸŽฏ

Passed the Hackviser CAPT Certification โ€“ My Module-by-Module Experience ๐ŸŽฏ

13
Comments 1
2 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
๐Ÿ” Broken Access Control (BAC) โ€“ A Key OWASP Top 10 Vulnerability (2025 Edition ๐Ÿ˜Ž)
Cover image for ๐Ÿ” Broken Access Control (BAC) โ€“ A Key OWASP Top 10 Vulnerability (2025 Edition ๐Ÿ˜Ž)

๐Ÿ” Broken Access Control (BAC) โ€“ A Key OWASP Top 10 Vulnerability (2025 Edition ๐Ÿ˜Ž)

6
Comments
2 min read
Security Research: Security Vulnerability Investigation

Security Research: Security Vulnerability Investigation

1
Comments
1 min read
Why Security as part of CI/CD Matters (And Where To Start)

Why Security as part of CI/CD Matters (And Where To Start)

Comments
2 min read
DNS: The Hidden Battlefield No One Talks About

DNS: The Hidden Battlefield No One Talks About

1
Comments
2 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project
Cover image for Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

1
Comments
5 min read
Why the Lock Icon in Your Browser Actually Matters: The Role of SSL and TLS

Why the Lock Icon in Your Browser Actually Matters: The Role of SSL and TLS

1
Comments
1 min read
SOC (Security Operations Center) Fundamentals: A Beginnerโ€™s Guide
Cover image for SOC (Security Operations Center) Fundamentals: A Beginnerโ€™s Guide

SOC (Security Operations Center) Fundamentals: A Beginnerโ€™s Guide

1
Comments
8 min read
The Art of Recon: What Happens When a Target Only Has One Door?
Cover image for The Art of Recon: What Happens When a Target Only Has One Door?

The Art of Recon: What Happens When a Target Only Has One Door?

Comments
4 min read
HTB - Support - Windows (Easy)

HTB - Support - Windows (Easy)

1
Comments
1 min read
๐—ฆ๐˜๐—ผ๐—ฝ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐—™๐—ฎ๐˜€๐˜

๐—ฆ๐˜๐—ผ๐—ฝ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐—™๐—ฎ๐˜€๐˜

1
Comments
1 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025
Cover image for When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
Firewalls 101
Cover image for Firewalls 101

Firewalls 101

Comments
12 min read
๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.