DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

6
Comments 2
13 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Comments
1 min read
OWASP Cornucopia is publishing it’s darkest secrets!

OWASP Cornucopia is publishing it’s darkest secrets!

5
Comments 1
5 min read
Persona Matrices for Authentication and Access Control

Persona Matrices for Authentication and Access Control

1
Comments
3 min read
How Companies Scan Their Own Networks: A Practical Red Team View with Nmap

How Companies Scan Their Own Networks: A Practical Red Team View with Nmap

2
Comments
2 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Comments
2 min read
MFA Fatigue Approval: When “Approve” Becomes Your Weakest Link

MFA Fatigue Approval: When “Approve” Becomes Your Weakest Link

1
Comments
6 min read
Why macOS Looks Healthy While Your Storage Fails

Why macOS Looks Healthy While Your Storage Fails

2
Comments
7 min read
When a Legitimate Security Flow Fails Under Stress

When a Legitimate Security Flow Fails Under Stress

1
Comments
3 min read
Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

1
Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.