Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Network Traffic Observability: Three PacketStreamer Use Cases
Deepfence
Deepfence
Deepfence
Follow
May 9 '22
Network Traffic Observability: Three PacketStreamer Use Cases
#
devsecops
#
infosec
#
appsec
#
cybersecurity
5
reactions
Comments
Add Comment
3 min read
🗞️ Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ?
adriens
adriens
adriens
Follow
for
opt-nc
May 5 '22
🗞️ Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ?
#
docker
#
java
#
infosec
#
devops
3
reactions
Comments
1
comment
1 min read
⚖️ Bench (and choose) Java-8 docker images with anchore/grype
adriens
adriens
adriens
Follow
for
opt-nc
Apr 25 '22
⚖️ Bench (and choose) Java-8 docker images with anchore/grype
#
docker
#
security
#
devsecops
#
infosec
7
reactions
Comments
3
comments
4 min read
Simulating a Phishing Attack Against Your Company
Joe Mainwaring
Joe Mainwaring
Joe Mainwaring
Follow
Mar 30 '22
Simulating a Phishing Attack Against Your Company
#
infosec
#
security
5
reactions
Comments
Add Comment
3 min read
Ohjelmistokehittäjästä eettiseksi hakkeriksi
minjahakkeroi
minjahakkeroi
minjahakkeroi
Follow
Mar 29 '22
Ohjelmistokehittäjästä eettiseksi hakkeriksi
#
career
#
security
#
womenintech
#
infosec
3
reactions
Comments
Add Comment
2 min read
Where all DEVs fail in Security
Theodoros Danos
Theodoros Danos
Theodoros Danos
Follow
Mar 28 '22
Where all DEVs fail in Security
#
infosec
#
webdev
#
programming
#
backend
6
reactions
Comments
Add Comment
2 min read
From Software Developer to Ethical Hacker
whatminjacodes [she/they]
whatminjacodes [she/they]
whatminjacodes [she/they]
Follow
Mar 29 '22
From Software Developer to Ethical Hacker
#
career
#
security
#
womenintech
#
infosec
19
reactions
Comments
1
comment
3 min read
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More
Deepfence
Deepfence
Deepfence
Follow
Mar 15 '22
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More
#
sbom
#
devsecops
#
infosec
#
appsec
7
reactions
Comments
Add Comment
5 min read
Reconmap 1.1.0 release notes
Santiago L
Santiago L
Santiago L
Follow
for
Reconmap
Mar 4 '22
Reconmap 1.1.0 release notes
#
vulnerability
#
pentesting
#
infosec
#
opensource
5
reactions
Comments
Add Comment
2 min read
I did a few things at STM CTF 2018 Prelims
Ata Kuyumcu
Ata Kuyumcu
Ata Kuyumcu
Follow
Jan 17 '22
I did a few things at STM CTF 2018 Prelims
#
ctf
#
python
#
infosec
6
reactions
Comments
Add Comment
6 min read
Horrifying Vulnerabilities in the Death/Birth Certificate System
Derek Ardolf
Derek Ardolf
Derek Ardolf
Follow
Nov 23 '21
Horrifying Vulnerabilities in the Death/Birth Certificate System
#
security
#
infosec
#
defcon
#
cybersecurity
4
reactions
Comments
Add Comment
2 min read
A Checklist to Quickly Evaluate SaaS Security
Patrick Walsh
Patrick Walsh
Patrick Walsh
Follow
Sep 27 '21
A Checklist to Quickly Evaluate SaaS Security
#
saas
#
security
#
infosec
#
evaluation
3
reactions
Comments
Add Comment
4 min read
How to Fix Clickjacking on NGINX Server in 6 Simple Steps🔥
Keshav Malik
Keshav Malik
Keshav Malik
Follow
Sep 26 '21
How to Fix Clickjacking on NGINX Server in 6 Simple Steps🔥
#
development
#
infosec
#
nginx
#
clickjacking
14
reactions
Comments
2
comments
2 min read
How to list Azure VM potentially affected by the OMI RCE
Olivier Miossec
Olivier Miossec
Olivier Miossec
Follow
Sep 17 '21
How to list Azure VM potentially affected by the OMI RCE
#
azure
#
infosec
#
security
#
omi
4
reactions
Comments
1
comment
1 min read
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 16 '21
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple
#
infosec
#
security
#
azure
#
cloud
6
reactions
Comments
Add Comment
4 min read
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 9 '21
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas
#
security
#
infosec
#
azure
#
serverless
8
reactions
Comments
Add Comment
3 min read
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 8 '21
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021
#
infosec
#
security
#
azure
#
serverless
7
reactions
Comments
Add Comment
3 min read
TryHackMe Super-Spam Walkthrough
Krishna
Krishna
Krishna
Follow
Aug 10 '21
TryHackMe Super-Spam Walkthrough
#
infosec
#
ctf
#
tryhackme
#
security
6
reactions
Comments
Add Comment
14 min read
TryHackMe Bounty Hacker Room Walkthrough
Krishna
Krishna
Krishna
Follow
Aug 7 '21
TryHackMe Bounty Hacker Room Walkthrough
#
beginners
#
infosec
#
tryhackme
#
ctf
3
reactions
Comments
Add Comment
4 min read
TryHackMe CMSpit Room Walkthrough
Krishna
Krishna
Krishna
Follow
Aug 5 '21
TryHackMe CMSpit Room Walkthrough
#
infosec
#
security
#
ctf
#
tryhackme
7
reactions
Comments
Add Comment
8 min read
A practical guide to writing secure Dockerfiles
Madhu Akula
Madhu Akula
Madhu Akula
Follow
Aug 24 '22
A practical guide to writing secure Dockerfiles
#
miro
#
devops
#
infosec
#
security
8
reactions
Comments
Add Comment
12 min read
Auditing NodeJs modules with YARA rules
Ruwan Pradeep Geeganage
Ruwan Pradeep Geeganage
Ruwan Pradeep Geeganage
Follow
Apr 6 '21
Auditing NodeJs modules with YARA rules
#
node
#
npm
#
yarn
#
infosec
7
reactions
Comments
Add Comment
4 min read
To Secure Today’s Code, It’s Time to Shift Left
Mackenzie
Mackenzie
Mackenzie
Follow
Mar 30 '21
To Secure Today’s Code, It’s Time to Shift Left
#
cybersecurity
#
appsec
#
security
#
infosec
10
reactions
Comments
Add Comment
6 min read
When should my startup prioritize infosec?
Gold Fig Labs
Gold Fig Labs
Gold Fig Labs
Follow
Feb 24 '21
When should my startup prioritize infosec?
#
infosec
#
secops
#
cloud
#
security
2
reactions
Comments
Add Comment
3 min read
Threat modelling for hunted coders
capital-inversion
capital-inversion
capital-inversion
Follow
for
Dreamcatcher-tech
Feb 22 '21
Threat modelling for hunted coders
#
infosec
#
privacy
#
tor
#
blockchain
5
reactions
Comments
Add Comment
13 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account