Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Sep 24 '25
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
#
nhi
#
infosec
#
security
#
identity
Comments
Add Comment
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Follow
Oct 9 '25
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
#
security
#
devops
#
iot
#
infosec
1
 reaction
Comments
Add Comment
2 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors
Nicolás
Nicolás
Nicolás
Follow
Oct 19 '25
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors
#
cybersecurity
#
beginners
#
infosec
#
security
1
 reaction
Comments
Add Comment
4 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
Keerthika K
Keerthika K
Keerthika K
Follow
Sep 4 '25
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
#
cybersecurity
#
programming
#
beginners
#
infosec
5
 reactions
Comments
Add Comment
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
Nvidia's AI Kill Chain
ToxSec
ToxSec
ToxSec
Follow
Oct 4 '25
Nvidia's AI Kill Chain
#
ai
#
killchain
#
infosec
#
cybersecurity
Comments
Add Comment
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 13 '25
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
#
infosec
#
cybersecurity
#
webdev
#
dataprivacy
2
 reactions
Comments
Add Comment
3 min read
Dealing With Dependency Vulnerabilities
Buffolander
Buffolander
Buffolander
Follow
Aug 31 '25
Dealing With Dependency Vulnerabilities
#
infosec
#
vulnerabilities
#
node
Comments
Add Comment
4 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
Dogan
Dogan
Dogan
Follow
Sep 24 '25
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
3 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Sep 18 '25
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series
#
cybersecurity
#
ai
#
infosec
#
weeklyseries
Comments
Add Comment
1 min read
Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows
GnomeMan4201
GnomeMan4201
GnomeMan4201
Follow
Sep 16 '25
Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows
#
ai
#
infosec
#
cybersecurity
1
 reaction
Comments
Add Comment
4 min read
Understanding Zero Trust: The Future of Cyber security
vidushhi panda
vidushhi panda
vidushhi panda
Follow
Aug 12 '25
Understanding Zero Trust: The Future of Cyber security
#
cybersecurity
#
infosec
#
cloudsecurity
#
techtrends
3
 reactions
Comments
Add Comment
3 min read
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance
Giorgi Akhobadze
Giorgi Akhobadze
Giorgi Akhobadze
Follow
Sep 14 '25
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance
#
cybersecurity
#
infosec
#
hacking
#
lateralmovement
Comments
Add Comment
8 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network
Giorgi Akhobadze
Giorgi Akhobadze
Giorgi Akhobadze
Follow
Sep 6 '25
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network
#
zerotrust
#
cybersecurity
#
network
#
infosec
Comments
Add Comment
7 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public
BobDaHacker
BobDaHacker
BobDaHacker
Follow
Jul 31 '25
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public
#
security
#
bugbounty
#
infosec
#
webdev
5
 reactions
Comments
Add Comment
1 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account