Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
Mark0
Mark0
Mark0
Follow
Feb 26
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
#
cybersecurity
#
infosec
#
azure
#
oauth
Comments
Add Comment
1 min read
The Descent Through the Trust Stack
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Feb 26
The Descent Through the Trust Stack
#
cybersecurity
#
security
#
infosec
#
ai
1
 reaction
Comments
Add Comment
5 min read
FullAgenticStack WhatsApp-first: RFC-WF-0009
suissAI
suissAI
suissAI
Follow
Feb 26
FullAgenticStack WhatsApp-first: RFC-WF-0009
#
architecture
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
6 min read
FullAgenticStack WhatsApp-first: RFC-WF-0004
suissAI
suissAI
suissAI
Follow
Feb 26
FullAgenticStack WhatsApp-first: RFC-WF-0004
#
architecture
#
infosec
#
security
#
systemdesign
Comments
Add Comment
6 min read
North Korea Is Now a Ransomware Affiliate — Lazarus Group Joins Medusa RaaS
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Feb 25
North Korea Is Now a Ransomware Affiliate — Lazarus Group Joins Medusa RaaS
#
security
#
cybersecurity
#
ransomware
#
infosec
Comments
Add Comment
3 min read
Yet Another CVE analysis (CVE-2019-14287)
Matthew Gasiewski
Matthew Gasiewski
Matthew Gasiewski
Follow
Feb 23
Yet Another CVE analysis (CVE-2019-14287)
#
infosec
#
sudo
#
cybersecurity
#
linux
Comments
Add Comment
2 min read
My OSINT Stack for Image & Identity Monitoring
Charles Lueilwitz
Charles Lueilwitz
Charles Lueilwitz
Follow
Feb 24
My OSINT Stack for Image & Identity Monitoring
#
automation
#
cybersecurity
#
infosec
#
monitoring
Comments
Add Comment
1 min read
Why Attestation Middleware Exists
Alex "ChainBreaker" Morrison
Alex "ChainBreaker" Morrison
Alex "ChainBreaker" Morrison
Follow
Feb 23
Why Attestation Middleware Exists
#
architecture
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
5 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
Mark0
Mark0
Mark0
Follow
Feb 25
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
#
cybersecurity
#
infosec
#
macos
#
ai
Comments
1
 comment
1 min read
Zero Trust + CTEM: Building Security That Validates Itself
Akshay Ram Shivakumar
Akshay Ram Shivakumar
Akshay Ram Shivakumar
Follow
Feb 23
Zero Trust + CTEM: Building Security That Validates Itself
#
architecture
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
6 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
Mark0
Mark0
Mark0
Follow
Feb 18
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
#
cybersecurity
#
infosec
#
android
#
malware
Comments
Add Comment
1 min read
CVE-2021-3156 analysis.
Matthew Gasiewski
Matthew Gasiewski
Matthew Gasiewski
Follow
Feb 22
CVE-2021-3156 analysis.
#
cybersecurity
#
infosec
#
linux
#
security
Comments
Add Comment
2 min read
1 little known secret of CompatTelRunner.exe
Mark0
Mark0
Mark0
Follow
Feb 17
1 little known secret of CompatTelRunner.exe
#
cybersecurity
#
infosec
#
windows
#
reverseengineering
Comments
Add Comment
1 min read
WinHttpOpen user agents
Mark0
Mark0
Mark0
Follow
Feb 17
WinHttpOpen user agents
#
cybersecurity
#
infosec
#
windows
#
networking
Comments
Add Comment
1 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps
Michael Errington
Michael Errington
Michael Errington
Follow
Feb 17
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps
#
android
#
infosec
#
cybersecurity
#
cryptography
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account