Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Why Attestation Middleware Exists
Alex "ChainBreaker" Morrison
Alex "ChainBreaker" Morrison
Alex "ChainBreaker" Morrison
Follow
Feb 23
Why Attestation Middleware Exists
#
architecture
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
5 min read
Week 3
Timothy Imanuel
Timothy Imanuel
Timothy Imanuel
Follow
Feb 28
Week 3
#
cybersecurity
#
devjournal
#
infosec
#
tooling
1
 reaction
Comments
Add Comment
2 min read
The Descent Through the Trust Stack
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Feb 26
The Descent Through the Trust Stack
#
cybersecurity
#
security
#
infosec
#
ai
2
 reactions
Comments
Add Comment
5 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
Mark0
Mark0
Mark0
Follow
Feb 25
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
#
cybersecurity
#
infosec
#
macos
#
ai
Comments
1
 comment
1 min read
Islands of Invariance
Mark0
Mark0
Mark0
Follow
Mar 6
Islands of Invariance
#
cybersecurity
#
infosec
#
malware
#
reverseengineering
1
 reaction
Comments
Add Comment
1 min read
Zero Trust + CTEM: Building Security That Validates Itself
Akshay Ram Shivakumar
Akshay Ram Shivakumar
Akshay Ram Shivakumar
Follow
Feb 23
Zero Trust + CTEM: Building Security That Validates Itself
#
architecture
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
6 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
Mark0
Mark0
Mark0
Follow
Feb 18
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
#
cybersecurity
#
infosec
#
android
#
malware
Comments
Add Comment
1 min read
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook
Mark0
Mark0
Mark0
Follow
Mar 3
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook
#
cybersecurity
#
infosec
#
threatintelligence
#
malware
1
 reaction
Comments
Add Comment
1 min read
CVE-2021-3156 analysis.
Matthew Gasiewski
Matthew Gasiewski
Matthew Gasiewski
Follow
Feb 22
CVE-2021-3156 analysis.
#
cybersecurity
#
infosec
#
linux
#
security
Comments
Add Comment
2 min read
WinHttpOpen user agents
Mark0
Mark0
Mark0
Follow
Feb 17
WinHttpOpen user agents
#
cybersecurity
#
infosec
#
windows
#
networking
Comments
Add Comment
1 min read
1 little known secret of CompatTelRunner.exe
Mark0
Mark0
Mark0
Follow
Feb 17
1 little known secret of CompatTelRunner.exe
#
cybersecurity
#
infosec
#
windows
#
reverseengineering
Comments
Add Comment
1 min read
If It's Free, You're the Product: Investigating Spenderlog
Helge Sverre
Helge Sverre
Helge Sverre
Follow
Mar 2
If It's Free, You're the Product: Investigating Spenderlog
#
data
#
infosec
#
privacy
#
security
Comments
Add Comment
18 min read
Week 2
Timothy Imanuel
Timothy Imanuel
Timothy Imanuel
Follow
Feb 28
Week 2
#
cybersecurity
#
devjournal
#
infosec
#
testing
2
 reactions
Comments
Add Comment
2 min read
Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval
mew
mew
mew
Follow
Feb 13
Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval
#
infosec
#
security
#
tooling
#
tutorial
Comments
Add Comment
4 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
Mark0
Mark0
Mark0
Follow
Feb 26
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
#
cybersecurity
#
infosec
#
azure
#
oauth
1
 reaction
Comments
Add Comment
1 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account