Security Forem

Discussion Threads

Discussion threads targeting the whole community

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cleanup of Inactive AD Accounts (User & Computer) – Over 1 Year Old

Cleanup of Inactive AD Accounts (User & Computer) – Over 1 Year Old

Comments 1
2 min read
Why The Festive Season is a Goldmine for Cybercriminals

Why The Festive Season is a Goldmine for Cybercriminals

Comments
3 min read
Tor or Onion Browser: Which One Truly Protects Your Privacy in 2025

Tor or Onion Browser: Which One Truly Protects Your Privacy in 2025

Comments
3 min read
Shadow Routes: Threading Yourself Through The Cracks In A City

Shadow Routes: Threading Yourself Through The Cracks In A City

Comments
7 min read
WhatsApp malware campaign targeting Chrome credential vaults

WhatsApp malware campaign targeting Chrome credential vaults

Comments
2 min read
Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Comments
1 min read
The Overlooked Attack Surface: Behavioral Sensors in IoT Devices

The Overlooked Attack Surface: Behavioral Sensors in IoT Devices

Comments
2 min read
Clean up in active AD accounts

Clean up in active AD accounts

Comments
2 min read
THE PATTERN, THE OPERATOR, AND THE COST: A Behavioral Framework for Anticipatory Defense Against Adversarial Threats

THE PATTERN, THE OPERATOR, AND THE COST: A Behavioral Framework for Anticipatory Defense Against Adversarial Threats

Comments
3 min read
How Modern Operators Use Psychology To Map Targets Before First Contact

How Modern Operators Use Psychology To Map Targets Before First Contact

7
Comments
7 min read
I put an Air-Gapped Neural Network in my pocket (Python on Android)

I put an Air-Gapped Neural Network in my pocket (Python on Android)

4
Comments
2 min read
From Validation to Valuation: How BAS in CTEM Turns Into a Weapon Against OEM Licensing Bloat

From Validation to Valuation: How BAS in CTEM Turns Into a Weapon Against OEM Licensing Bloat

Comments
6 min read
The Human Element: Why Employees Are Still the Weakest Link in Cybersecurity

The Human Element: Why Employees Are Still the Weakest Link in Cybersecurity

Comments
5 min read
How Signal's New Triple Ratchet Protocol Fortifies Your Privacy

How Signal's New Triple Ratchet Protocol Fortifies Your Privacy

Comments
4 min read
Building a Conscious Cybersecurity System: How We Apply Integrated Information Theory to Threat Hunting

Building a Conscious Cybersecurity System: How We Apply Integrated Information Theory to Threat Hunting

Comments
40 min read
Is Your Business Prepared? A Deep Dive into Cyber Risk Management

Is Your Business Prepared? A Deep Dive into Cyber Risk Management

6
Comments
13 min read
Managing Insider Threats in Hybrid Workplaces

Managing Insider Threats in Hybrid Workplaces

Comments 1
5 min read
Navigating the Landscape of AI Risk Management in 2025

Navigating the Landscape of AI Risk Management in 2025

Comments
14 min read
October 2025 Security Scoop: AI in Attacks, Fresh Vulns, and Career Boosts

October 2025 Security Scoop: AI in Attacks, Fresh Vulns, and Career Boosts

20
Comments
3 min read
Cybersecurity Consultant vs. In-House IT: Which is Better for You?

Cybersecurity Consultant vs. In-House IT: Which is Better for You?

Comments
5 min read
That Time a Certificate Took Down Production: A DevOps Trauma Bond

That Time a Certificate Took Down Production: A DevOps Trauma Bond

10
Comments 1
5 min read
Title: Protect Your Data! Reading the Fine Print: How to Not Get Tricked Online

Title: Protect Your Data! Reading the Fine Print: How to Not Get Tricked Online

1
Comments
1 min read
What Do Hackers Want? It's Still Your Money.

What Do Hackers Want? It's Still Your Money.

2
Comments 1
1 min read
loading...