DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
# How I Encrypt and Use Credentials on IBM i

# How I Encrypt and Use Credentials on IBM i

Comments
9 min read
Why CAPTCHA and Traditional Verification Methods Are Failing

Why CAPTCHA and Traditional Verification Methods Are Failing

Comments
8 min read
KYC vs ID verification: the same software, for different reasons

KYC vs ID verification: the same software, for different reasons

Comments
3 min read
WordPress fake system-control plugin and MU-plugin backdoor

WordPress fake system-control plugin and MU-plugin backdoor

Comments
13 min read
Monitoring Claude Code/Cowork at scale with OTel in Elastic

Monitoring Claude Code/Cowork at scale with OTel in Elastic

Comments
1 min read
# Day 1 – The Biggest Beginner Mistake in SOC: Ignoring Networking 🚀

# Day 1 – The Biggest Beginner Mistake in SOC: Ignoring Networking 🚀

Comments
2 min read
Vercel Hackeada: A história por trás do ataque

Vercel Hackeada: A história por trás do ataque

Comments
3 min read
PingFederate Token Exchange Processor Policy

PingFederate Token Exchange Processor Policy

Comments
12 min read
More than pretty pictures: Wendy Bishop on visual storytelling in tech

More than pretty pictures: Wendy Bishop on visual storytelling in tech

Comments
1 min read
How to Triage a Phishing Alert Faster — Without Rebuilding the Process Every Time

How to Triage a Phishing Alert Faster — Without Rebuilding the Process Every Time

Comments
5 min read
Quttera Blacklist Removal Case Study: How I Removed a Website from the Quttera Blacklist in 12 Hours

Quttera Blacklist Removal Case Study: How I Removed a Website from the Quttera Blacklist in 12 Hours

Comments
5 min read
From Blueprints to Battlegrounds: My Experience as a Cybersecurity Intern at Anonymous India

From Blueprints to Battlegrounds: My Experience as a Cybersecurity Intern at Anonymous India

Comments
2 min read
The Cloud Security Checklist I Use at Every Enterprise Engagement

The Cloud Security Checklist I Use at Every Enterprise Engagement

Comments
2 min read
Common SOC 2 Failures (Real World)

Common SOC 2 Failures (Real World)

Comments
3 min read
I Built an Offline Threat-Hunting CLI in Python — Here's How ThreatLens Catches Real Attacks

I Built an Offline Threat-Hunting CLI in Python — Here's How ThreatLens Catches Real Attacks

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.