Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Resolving an E-commerce DNS Hijack via a Compromised Cloudflare Account
MD Pabel
MD Pabel
MD Pabel
Follow
Feb 2
Resolving an E-commerce DNS Hijack via a Compromised Cloudflare Account
#
cybersecurity
#
infosec
#
networking
#
security
Comments
Add Comment
4 min read
How a Former Developer Hijacked a WordPress Site
MD Pabel
MD Pabel
MD Pabel
Follow
Feb 2
How a Former Developer Hijacked a WordPress Site
#
cybersecurity
#
infosec
#
security
#
wordpress
Comments
Add Comment
4 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Giorgi Akhobadze
Giorgi Akhobadze
Giorgi Akhobadze
Follow
Sep 26 '25
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
#
cybersecurity
#
forensics
#
infosec
#
malware
Comments
Add Comment
6 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Sep 24 '25
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
#
nhi
#
infosec
#
security
#
identity
Comments
Add Comment
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Follow
Oct 9 '25
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
#
security
#
devops
#
iot
#
infosec
1
reaction
Comments
Add Comment
2 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors
Nicolás
Nicolás
Nicolás
Follow
Oct 19 '25
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors
#
cybersecurity
#
beginners
#
infosec
#
security
1
reaction
Comments
Add Comment
4 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 12 '25
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late
#
infosec
#
cybersecurity
#
dataprotection
#
dataprivacy
1
reaction
Comments
Add Comment
3 min read
WordPress Hacked: Fake Cloudflare “Verify You Are Human” — A WordPress Malware Removal Case Study
MD Pabel
MD Pabel
MD Pabel
Follow
Feb 2
WordPress Hacked: Fake Cloudflare “Verify You Are Human” — A WordPress Malware Removal Case Study
#
cybersecurity
#
infosec
#
security
#
wordpress
Comments
Add Comment
5 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
Keerthika K
Keerthika K
Keerthika K
Follow
Sep 4 '25
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
#
cybersecurity
#
programming
#
beginners
#
infosec
5
reactions
Comments
Add Comment
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
reaction
Comments
Add Comment
5 min read
Nvidia's AI Kill Chain
ToxSec
ToxSec
ToxSec
Follow
Oct 4 '25
Nvidia's AI Kill Chain
#
ai
#
killchain
#
infosec
#
cybersecurity
Comments
Add Comment
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 13 '25
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
#
infosec
#
cybersecurity
#
webdev
#
dataprivacy
2
reactions
Comments
Add Comment
3 min read
Dealing With Dependency Vulnerabilities
Buffolander
Buffolander
Buffolander
Follow
Aug 31 '25
Dealing With Dependency Vulnerabilities
#
infosec
#
vulnerabilities
#
node
Comments
Add Comment
4 min read
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
Yasmine Boussena
Yasmine Boussena
Yasmine Boussena
Follow
Sep 19 '25
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?
#
cybersecurity
#
infosec
#
devops
#
technology
1
reaction
Comments
Add Comment
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
Dogan
Dogan
Dogan
Follow
Sep 24 '25
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
3 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account