Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to Remove “Drive-By” Malware & Fix a SWITCH Domain Deactivation Warning
MD Pabel
MD Pabel
MD Pabel
Follow
Feb 2
How to Remove “Drive-By” Malware & Fix a SWITCH Domain Deactivation Warning
#
cybersecurity
#
infosec
#
security
#
tutorial
Comments
Add Comment
4 min read
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox đź§ đź“©
Willie Harris
Willie Harris
Willie Harris
Follow
Dec 14 '25
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox đź§ đź“©
#
cybersecurity
#
phishing
#
infosec
5
 reactions
Comments
Add Comment
4 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat
Shresth Paul
Shresth Paul
Shresth Paul
Follow
Nov 3 '25
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat
#
devsecops
#
cybersecurity
#
infosec
#
vulnerabilities
1
 reaction
Comments
1
 comment
1 min read
THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations
KL3FT3Z
KL3FT3Z
KL3FT3Z
Follow
Dec 6 '25
THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations
#
cybersecurity
#
redteam
#
webdev
#
infosec
18
 reactions
Comments
Add Comment
5 min read
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired
Nimesh Thakur
Nimesh Thakur
Nimesh Thakur
Follow
Dec 6 '25
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired
#
bugbounty
#
opensource
#
node
#
infosec
5
 reactions
Comments
Add Comment
3 min read
Designing a Scalable Multi-Locale Structure for Technical Content: A Practical Case Study
DenysShchur
DenysShchur
DenysShchur
Follow
Dec 4 '25
Designing a Scalable Multi-Locale Structure for Technical Content: A Practical Case Study
#
infosec
#
seo
#
documentation
#
github
Comments
Add Comment
1 min read
I Was Given a “Job Assignment” That Installed Malware
Michael M
Michael M
Michael M
Follow
Nov 10 '25
I Was Given a “Job Assignment” That Installed Malware
#
security
#
nodejs
#
npm
#
infosec
3
 reactions
Comments
Add Comment
2 min read
DevSecOps: Modelo de madurez y alternativas de implementaciĂłn
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Follow
Oct 27 '25
DevSecOps: Modelo de madurez y alternativas de implementaciĂłn
#
devsecops
#
cybersecurity
#
infosec
#
security
5
 reactions
Comments
Add Comment
10 min read
Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Nov 29 '25
Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know
#
cybersecurity
#
security
#
infosec
#
ai
2
 reactions
Comments
Add Comment
4 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Muhammad Taha Khan
Muhammad Taha Khan
Muhammad Taha Khan
Follow
Oct 20 '25
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
#
security
#
websecurity
#
infosec
Comments
Add Comment
4 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Oct 31 '25
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
#
cybersecurity
#
passwords
#
infosec
#
freelancers
1
 reaction
Comments
Add Comment
2 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities
SilentWire Cybersecurity
SilentWire Cybersecurity
SilentWire Cybersecurity
Follow
Nov 19 '25
The Real Reason Most Pentests Miss Critical Vulnerabilities
#
cybersecurity
#
infosec
#
cyber
#
career
1
 reaction
Comments
Add Comment
3 min read
Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety
Sridhar CR
Sridhar CR
Sridhar CR
Follow
Nov 16 '25
Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety
#
ai
#
agents
#
data
#
infosec
2
 reactions
Comments
1
 comment
5 min read
Bug Bounty Hunting for GenAI
ToxSec
ToxSec
ToxSec
Follow
Oct 6 '25
Bug Bounty Hunting for GenAI
#
bugbounty
#
cybersecurity
#
infosec
#
reporting
Comments
Add Comment
8 min read
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
GnomeMan4201
GnomeMan4201
GnomeMan4201
Follow
Nov 9 '25
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
#
cybersecurity
#
redteam
#
infosec
#
offensivesecurity
Comments
Add Comment
5 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account