DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Week 6

Week 6

Comments
2 min read
Beyond End-to-End Encryption: How the FBI Recovered "Deleted" Signal Messages

Beyond End-to-End Encryption: How the FBI Recovered "Deleted" Signal Messages

Comments
2 min read
SSRF to AWS Credential Harvest — The Capital One Attack Chain, Visualized| CAISD

SSRF to AWS Credential Harvest — The Capital One Attack Chain, Visualized| CAISD

Comments
2 min read
SSRF Attack — When the Server Becomes the Attacker | CAISD

SSRF Attack — When the Server Becomes the Attacker | CAISD

Comments
2 min read
I used a security audit to harden Open Relay instead of shipping another shiny feature

I used a security audit to harden Open Relay instead of shipping another shiny feature

Comments
1 min read
CYBERSECURITY

CYBERSECURITY

Comments
1 min read
Why I built an async recursive engine for OSINT (and why I nearly went insane doing it)

Why I built an async recursive engine for OSINT (and why I nearly went insane doing it)

1
Comments
3 min read
Every Compliance Framework Requires Key Rotation. No Platform Tells You When.

Every Compliance Framework Requires Key Rotation. No Platform Tells You When.

Comments
5 min read
Vulnerabities are being exploited faster than ever: opportunity in disguise

Vulnerabities are being exploited faster than ever: opportunity in disguise

Comments
2 min read
Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Comments
1 min read
CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required

CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required

Comments
2 min read
A laughing RAT: CrystalX combines spyware, stealer, and prankware features

A laughing RAT: CrystalX combines spyware, stealer, and prankware features

Comments
1 min read
Prioritizing Risk: Why Context Matters in API Security

Prioritizing Risk: Why Context Matters in API Security

Comments
4 min read
Claude Code Leak: Why the Harness, Not the Model

Claude Code Leak: Why the Harness, Not the Model

Comments
7 min read
CTF Writeup: PowerAnalysis: Warmup

CTF Writeup: PowerAnalysis: Warmup

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.