DEV Community

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Comments
2 min read
Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Cybersecurity Weekly#12: What Developers Should Care About This Week

Cybersecurity Weekly#12: What Developers Should Care About This Week

1
Comments
2 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
Why VPN Traffic Creates New Security Problems

Why VPN Traffic Creates New Security Problems

Comments 1
3 min read
A Breakdown of Darkweb Exit Scams & Their Warning Signs

A Breakdown of Darkweb Exit Scams & Their Warning Signs

Comments
1 min read
PCI DSS 4.0 Prep for US SaaS Teams

PCI DSS 4.0 Prep for US SaaS Teams

Comments
4 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

Comments
1 min read
The Real Cost Of Letting AI Do Your Thinking For You

The Real Cost Of Letting AI Do Your Thinking For You

2
Comments 1
3 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

5
Comments
4 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

16
Comments
5 min read
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired

Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired

5
Comments
3 min read
Designing a Scalable Multi-Locale Structure for Technical Content: A Practical Case Study

Designing a Scalable Multi-Locale Structure for Technical Content: A Practical Case Study

Comments
1 min read
loading...