DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Fourteen Shell Companies, One Spy Agency, and Why Bot Traffic Is Cheap Until It Is Not

Fourteen Shell Companies, One Spy Agency, and Why Bot Traffic Is Cheap Until It Is Not

Comments
5 min read
Battle-Tested: What Getting Hacked Taught Me About Web & Cyber Security

Battle-Tested: What Getting Hacked Taught Me About Web & Cyber Security

1
Comments
5 min read
From XSS to Shell: How I Broke Into a Server and Lived to Tell the Tale

From XSS to Shell: How I Broke Into a Server and Lived to Tell the Tale

Comments
4 min read
The "Invisible" Backdoor: Forensic Analysis of a Persistent WordPress Malware Infection and How to Actually Purge It

The "Invisible" Backdoor: Forensic Analysis of a Persistent WordPress Malware Infection and How to Actually Purge It

Comments
5 min read
ClickFIX Malware

ClickFIX Malware

Comments
3 min read
De CSRF a RCE: una visita web cuesta una shell en OpenYak

De CSRF a RCE: una visita web cuesta una shell en OpenYak

Comments
9 min read
Week 9

Week 9

Comments
1 min read
Week 8

Week 8

Comments
3 min read
NGINX CVE-2026-42945: An 18-Year-Old Heap Overflow Now Actively Exploited

NGINX CVE-2026-42945: An 18-Year-Old Heap Overflow Now Actively Exploited

Comments
3 min read
x64 Windows Assembly Fundamentals Part 1: What You Actually Need to Know

x64 Windows Assembly Fundamentals Part 1: What You Actually Need to Know

Comments
5 min read
AI Can't Stop AI? Wrong Problem. Wrong Layer.

AI Can't Stop AI? Wrong Problem. Wrong Layer.

2
Comments
4 min read
Monté un mini-SOC en mi portátil con honeypot, Wazuh e IA local — proyecto del Máster en Evolve

Monté un mini-SOC en mi portátil con honeypot, Wazuh e IA local — proyecto del Máster en Evolve

Comments
5 min read
Cybersecurity Foundations: Building a Cohesive Strategy from Interlocking Principles

Cybersecurity Foundations: Building a Cohesive Strategy from Interlocking Principles

Comments
4 min read
Cybersecurity Foundations: Secure by Design — Shifting from Firefighting to Proactive Architecture

Cybersecurity Foundations: Secure by Design — Shifting from Firefighting to Proactive Architecture

Comments
4 min read
CyberKB: Cómo construí una base de conocimiento de ciberseguridad con IA y Claude Sonnet — mi proyecto en Evolve

CyberKB: Cómo construí una base de conocimiento de ciberseguridad con IA y Claude Sonnet — mi proyecto en Evolve

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.