Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems
Saranyo Deyasi
Saranyo Deyasi
Saranyo Deyasi
Follow
Mar 27
Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems
#
cybersecurity
#
infosec
#
psychology
#
security
1
 reaction
Comments
Add Comment
2 min read
Update: pecheck.py Version 0.7.20
Mark0
Mark0
Mark0
Follow
Mar 13
Update: pecheck.py Version 0.7.20
#
cybersecurity
#
infosec
#
malware
#
tools
1
 reaction
Comments
Add Comment
1 min read
Day 20: SUID Deep-Dive — From Zip to Tar Exploitation 🕵️‍♂️
Devon Argent
Devon Argent
Devon Argent
Follow
Mar 14
Day 20: SUID Deep-Dive — From Zip to Tar Exploitation 🕵️‍♂️
#
infosec
#
linux
#
security
#
tutorial
1
 reaction
Comments
Add Comment
1 min read
Infinite Campus Salesforce Breach Exposes School Staff Data
BeyondMachines
BeyondMachines
BeyondMachines
Follow
for
BeyondMachines
Mar 26
Infinite Campus Salesforce Breach Exposes School Staff Data
#
cybersecurity
#
infosec
1
 reaction
Comments
Add Comment
1 min read
I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing
Yoel Frischoff
Yoel Frischoff
Yoel Frischoff
Follow
Mar 16
I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing
#
showdev
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
2 min read
Compliance Isn't a Legal Problem. It's a Sales Problem.
Context First AI
Context First AI
Context First AI
Follow
Mar 10
Compliance Isn't a Legal Problem. It's a Sales Problem.
#
infosec
#
saas
#
security
#
startup
Comments
Add Comment
8 min read
When light becomes a weapon: laser-based command injection attacks on voice assistants
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 8
When light becomes a weapon: laser-based command injection attacks on voice assistants
#
iotsecurity
#
infosec
#
threatmodeling
#
cybersecurity
1
 reaction
Comments
Add Comment
2 min read
Day 18: The Danger of Wildcards (*) & Library Injection 🕵️‍♂️
Devon Argent
Devon Argent
Devon Argent
Follow
Mar 12
Day 18: The Danger of Wildcards (*) & Library Injection 🕵️‍♂️
#
cybersecurity
#
infosec
#
linux
#
security
1
 reaction
Comments
Add Comment
1 min read
Understanding Web Shell Attacks
Hawkinsdev
Hawkinsdev
Hawkinsdev
Follow
Mar 12
Understanding Web Shell Attacks
#
cybersecurity
#
infosec
#
security
#
tutorial
1
 reaction
Comments
Add Comment
4 min read
I Built an OSINT Tool to Automate Recon Across 100+ Platforms
Ruyynn
Ruyynn
Ruyynn
Follow
Mar 27
I Built an OSINT Tool to Automate Recon Across 100+ Platforms
#
opensource
#
python
#
cybersecurity
#
infosec
12
 reactions
Comments
3
 comments
1 min read
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
JP Dias
JP Dias
JP Dias
Follow
Mar 17
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
#
phishing
#
malware
#
rat
#
infosec
Comments
Add Comment
10 min read
Walking Into an Unknown Network: The First Thing I Check
Almost Brilliant Ideas
Almost Brilliant Ideas
Almost Brilliant Ideas
Follow
Mar 7
Walking Into an Unknown Network: The First Thing I Check
#
cybersecurity
#
infosec
#
networking
#
security
1
 reaction
Comments
Add Comment
3 min read
NDC Security 2026
Chris Ayers
Chris Ayers
Chris Ayers
Follow
Mar 1
NDC Security 2026
#
news
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
2 min read
Simple Android Encryption With No Accounts or Subscriptions
Almost Brilliant Ideas
Almost Brilliant Ideas
Almost Brilliant Ideas
Follow
Mar 3
Simple Android Encryption With No Accounts or Subscriptions
#
android
#
security
#
encryption
#
infosec
1
 reaction
Comments
Add Comment
3 min read
A Deep Dive into the GetProcessHandleFromHwnd API
Mark0
Mark0
Mark0
Follow
Feb 27
A Deep Dive into the GetProcessHandleFromHwnd API
#
cybersecurity
#
infosec
#
windows
#
exploit
1
 reaction
Comments
Add Comment
1 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account