DEV Community

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

6
Comments
2 min read
Security Research: Security Vulnerability Investigation

Security Research: Security Vulnerability Investigation

1
Comments
1 min read
Why Security as part of CI/CD Matters (And Where To Start)

Why Security as part of CI/CD Matters (And Where To Start)

Comments
2 min read
DNS: The Hidden Battlefield No One Talks About

DNS: The Hidden Battlefield No One Talks About

1
Comments
2 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

1
Comments
5 min read
Why the Lock Icon in Your Browser Actually Matters: The Role of SSL and TLS

Why the Lock Icon in Your Browser Actually Matters: The Role of SSL and TLS

1
Comments
1 min read
The Octocat Isn’t What It Seems

The Octocat Isn’t What It Seems

Comments
4 min read
SOC (Security Operations Center) Fundamentals: A Beginner’s Guide

SOC (Security Operations Center) Fundamentals: A Beginner’s Guide

1
Comments
8 min read
Code Execution Through Email: How I Used Claude to Hack Itself

Code Execution Through Email: How I Used Claude to Hack Itself

Comments
1 min read
The Art of Recon: What Happens When a Target Only Has One Door?

The Art of Recon: What Happens When a Target Only Has One Door?

Comments
4 min read
HTB - Support - Windows (Easy)

HTB - Support - Windows (Easy)

1
Comments
1 min read
𝗦𝘁𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝗮𝘁𝘁𝗮𝗰𝗸𝘀 𝗙𝗮𝘀𝘁

𝗦𝘁𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝗮𝘁𝘁𝗮𝗰𝗸𝘀 𝗙𝗮𝘀𝘁

1
Comments
1 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
Firewalls 101

Firewalls 101

Comments
12 min read
Data Privacy

Data Privacy

Comments
1 min read
How to Deploy a Windows Server 2022 Domain Controller with VirtualBox Manager

How to Deploy a Windows Server 2022 Domain Controller with VirtualBox Manager

5
Comments
4 min read
Cloudgoat BeanstalkSecrets Walkthrough

Cloudgoat BeanstalkSecrets Walkthrough

Comments
4 min read
🚨 “Google Alert: Someone Just Logged In?” — Don’t Fall for the Phishing Trap

🚨 “Google Alert: Someone Just Logged In?” — Don’t Fall for the Phishing Trap

2
Comments
3 min read
ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

1
Comments
2 min read
Security Briefing: Security Flaw Analysis

Security Briefing: Security Flaw Analysis

2
Comments
3 min read
Threat Advisory: Security Flaw Defense

Threat Advisory: Security Flaw Defense

1
Comments
1 min read
Critical Security Flaw: Security Flaw Techniques

Critical Security Flaw: Security Flaw Techniques

1
Comments
1 min read
Security Analysis: None

Security Analysis: None

1
Comments
3 min read
Threat Intelligence: Security Flaw Exploitation

Threat Intelligence: Security Flaw Exploitation

1
Comments
1 min read
loading...