DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
I Found a Hidden “Backdoor” in a Client’s WordPress Site

I Found a Hidden “Backdoor” in a Client’s WordPress Site

Comments
4 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
WP Compatibility Patch Backdoor

WP Compatibility Patch Backdoor

Comments
2 min read
The Art of Operational Indistinguishability

The Art of Operational Indistinguishability

1
Comments
11 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Comments
2 min read
Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Comments
4 min read
Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
Hidden Backdoors & Fake Plugins: How Hackers Live in Your WordPress Dashboard

Hidden Backdoors & Fake Plugins: How Hackers Live in Your WordPress Dashboard

Comments
4 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

1
Comments 2
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.