Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Zero Trust + CTEM: Building Security That Validates Itself
Akshay Ram Shivakumar
Akshay Ram Shivakumar
Akshay Ram Shivakumar
Follow
Feb 23
Zero Trust + CTEM: Building Security That Validates Itself
#
architecture
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
6 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
Mark0
Mark0
Mark0
Follow
Feb 18
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
#
cybersecurity
#
infosec
#
android
#
malware
Comments
Add Comment
1 min read
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook
Mark0
Mark0
Mark0
Follow
Mar 3
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook
#
cybersecurity
#
infosec
#
threatintelligence
#
malware
1
 reaction
Comments
Add Comment
1 min read
CVE-2021-3156 analysis.
Matthew Gasiewski
Matthew Gasiewski
Matthew Gasiewski
Follow
Feb 22
CVE-2021-3156 analysis.
#
cybersecurity
#
infosec
#
linux
#
security
Comments
Add Comment
2 min read
1 little known secret of CompatTelRunner.exe
Mark0
Mark0
Mark0
Follow
Feb 17
1 little known secret of CompatTelRunner.exe
#
cybersecurity
#
infosec
#
windows
#
reverseengineering
Comments
Add Comment
1 min read
WinHttpOpen user agents
Mark0
Mark0
Mark0
Follow
Feb 17
WinHttpOpen user agents
#
cybersecurity
#
infosec
#
windows
#
networking
Comments
Add Comment
1 min read
If It's Free, You're the Product: Investigating Spenderlog
Helge Sverre
Helge Sverre
Helge Sverre
Follow
Mar 2
If It's Free, You're the Product: Investigating Spenderlog
#
data
#
infosec
#
privacy
#
security
Comments
Add Comment
18 min read
Week 2
Timothy Imanuel
Timothy Imanuel
Timothy Imanuel
Follow
Feb 28
Week 2
#
cybersecurity
#
devjournal
#
infosec
#
testing
2
 reactions
Comments
Add Comment
2 min read
Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval
mew
mew
mew
Follow
Feb 13
Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval
#
infosec
#
security
#
tooling
#
tutorial
Comments
Add Comment
4 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
Mark0
Mark0
Mark0
Follow
Feb 26
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
#
cybersecurity
#
infosec
#
azure
#
oauth
1
 reaction
Comments
Add Comment
1 min read
FullAgenticStack WhatsApp-first: RFC-WF-0009
suissAI
suissAI
suissAI
Follow
Feb 26
FullAgenticStack WhatsApp-first: RFC-WF-0009
#
architecture
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
6 min read
Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass
BeyondMachines
BeyondMachines
BeyondMachines
Follow
for
BeyondMachines
Feb 11
Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass
#
cybersecurity
#
infosec
Comments
Add Comment
1 min read
5 Cybersecurity Habits Every Internet User Should Have
Hamda Naz
Hamda Naz
Hamda Naz
Follow
Feb 25
5 Cybersecurity Habits Every Internet User Should Have
#
beginners
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
2 min read
What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)
Abhay Negi
Abhay Negi
Abhay Negi
Follow
Feb 11
What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)
#
community
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
2 min read
Why Windows Crashes and How To Build Stable PCs
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Feb 8
Why Windows Crashes and How To Build Stable PCs
#
techtalks
#
infosec
#
cybersecurity
#
computerscience
Comments
Add Comment
7 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account