Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
📞 WhatsApp Missed Call Scam — The Call You Should Never Return
Syber Secure
Syber Secure
Syber Secure
Follow
Aug 13 '25
📞 WhatsApp Missed Call Scam — The Call You Should Never Return
#
cybersecurity
#
scams
#
whatsapp
#
infosec
4
 reactions
Comments
1
 comment
4 min read
HTB - Bastion (Windows)
Valera1
Valera1
Valera1
Follow
Aug 11 '25
HTB - Bastion (Windows)
#
security
#
infosec
#
cybersecurity
1
 reaction
Comments
Add Comment
1 min read
Cloudgoat BeanstalkSecrets Walkthrough
Yar Khan
Yar Khan
Yar Khan
Follow
Jul 6 '25
Cloudgoat BeanstalkSecrets Walkthrough
#
aws
#
python
#
infosec
#
cloud
Comments
Add Comment
4 min read
🚨 “Google Alert: Someone Just Logged In?” — Don’t Fall for the Phishing Trap
Syber Secure
Syber Secure
Syber Secure
Follow
Jul 9 '25
🚨 “Google Alert: Someone Just Logged In?” — Don’t Fall for the Phishing Trap
#
cybersecurity
#
phishing
#
infosec
#
ethicalhacking
2
 reactions
Comments
Add Comment
3 min read
ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos
0trust0day
0trust0day
0trust0day
Follow
Aug 7 '25
ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos
#
cybersecurity
#
infosec
#
hacker
#
programming
1
 reaction
Comments
Add Comment
2 min read
Security Briefing: Security Flaw Analysis
Rafal
Rafal
Rafal
Follow
Jul 27 '25
Security Briefing: Security Flaw Analysis
#
cybersecurity
#
vulnerability
#
security
#
infosec
2
 reactions
Comments
Add Comment
3 min read
Threat Advisory: Security Flaw Defense
Rafal
Rafal
Rafal
Follow
Jul 27 '25
Threat Advisory: Security Flaw Defense
#
cybersecurity
#
vulnerability
#
security
#
infosec
1
 reaction
Comments
Add Comment
1 min read
Threat Intelligence: Security Flaw Exploitation
Rafal
Rafal
Rafal
Follow
Jul 27 '25
Threat Intelligence: Security Flaw Exploitation
#
cybersecurity
#
vulnerability
#
security
#
infosec
1
 reaction
Comments
Add Comment
1 min read
Critical Security Flaw: Security Flaw Techniques
Rafal
Rafal
Rafal
Follow
Jul 27 '25
Critical Security Flaw: Security Flaw Techniques
#
cybersecurity
#
vulnerability
#
security
#
infosec
1
 reaction
Comments
Add Comment
1 min read
Security Analysis: None
Rafal
Rafal
Rafal
Follow
Jul 27 '25
Security Analysis: None
#
cybersecurity
#
vulnerability
#
security
#
infosec
1
 reaction
Comments
Add Comment
3 min read
Using LLM in Access Management with OpenAM and Spring AI as an example
Maxim Thomas
Maxim Thomas
Maxim Thomas
Follow
Jun 30 '25
Using LLM in Access Management with OpenAM and Spring AI as an example
#
ai
#
infosec
#
opensource
#
webdev
1
 reaction
Comments
Add Comment
10 min read
Cybersecurity Deep Dive: Security Vulnerability
Rafal
Rafal
Rafal
Follow
Jul 27 '25
Cybersecurity Deep Dive: Security Vulnerability
#
cybersecurity
#
vulnerability
#
security
#
infosec
1
 reaction
Comments
2
 comments
1 min read
Code Execution Through Email: How I Used Claude to Hack Itself
Pynt.io
Pynt.io
Pynt.io
Follow
Jul 26 '25
Code Execution Through Email: How I Used Claude to Hack Itself
#
llmsecurity
#
claude
#
infosec
#
llm
Comments
Add Comment
1 min read
Lessons Learned: Getting Started with Blue Teaming via TryHackMe's "Defensive Security Intro"
Emanuele
Emanuele
Emanuele
Follow
Jun 20 '25
Lessons Learned: Getting Started with Blue Teaming via TryHackMe's "Defensive Security Intro"
#
cybersecurity
#
learning
#
tryhackme
#
infosec
Comments
Add Comment
2 min read
Why I Hardened My Linux Laptop Like a Vault (and How You Can Too)
zenthracore
zenthracore
zenthracore
Follow
Jul 24 '25
Why I Hardened My Linux Laptop Like a Vault (and How You Can Too)
#
infosec
#
cybersecurity
#
linux
#
luks
1
 reaction
Comments
1
 comment
3 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account