Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How Anomaly Detection Actually Works in Security Operations
Charles Givre
Charles Givre
Charles Givre
Follow
Apr 20
How Anomaly Detection Actually Works in Security Operations
#
cybersecurity
#
infosec
#
machinelearning
#
security
Comments
Add Comment
5 min read
I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them
Benjamin
Benjamin
Benjamin
Follow
Mar 24
I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them
#
cybersecurity
#
infosec
#
security
#
testing
Comments
Add Comment
8 min read
PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution
BeyondMachines
BeyondMachines
BeyondMachines
Follow
for
BeyondMachines
Mar 22
PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution
#
cybersecurity
#
infosec
1
 reaction
Comments
Add Comment
1 min read
2026 Post-Quantum Tunnels: Fighting Harvest Now, Decrypt Later
InstaTunnel
InstaTunnel
InstaTunnel
Follow
Mar 27
2026 Post-Quantum Tunnels: Fighting Harvest Now, Decrypt Later
#
cybersecurity
#
infosec
#
networking
#
security
1
 reaction
Comments
Add Comment
11 min read
AI Chatbot Hack: Two‑Hour Breach Rewrites Security
Simon Paxton
Simon Paxton
Simon Paxton
Follow
Mar 23
AI Chatbot Hack: Two‑Hour Breach Rewrites Security
#
mckinsey
#
cybersecurity
#
databreach
#
infosec
Comments
Add Comment
7 min read
AI Agent Hack: Prompt‑Layer Security Is the Real Threat
Simon Paxton
Simon Paxton
Simon Paxton
Follow
Mar 22
AI Agent Hack: Prompt‑Layer Security Is the Real Threat
#
cybersecurity
#
infosec
#
promptengineering
#
datasecurity
Comments
Add Comment
7 min read
The Security Crisis Hiding Inside Machine Identities
Sonia Bobrik
Sonia Bobrik
Sonia Bobrik
Follow
Mar 26
The Security Crisis Hiding Inside Machine Identities
#
architecture
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️
Devon Argent
Devon Argent
Devon Argent
Follow
Mar 22
Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️
#
cybersecurity
#
infosec
#
networking
#
tutorial
Comments
Add Comment
1 min read
Hack The Box - Snapped Writeup
Vall3nSs
Vall3nSs
Vall3nSs
Follow
Apr 24
Hack The Box - Snapped Writeup
#
cybersecurity
#
infosec
#
linux
#
security
2
 reactions
Comments
Add Comment
6 min read
SSRF Attack — When the Server Becomes the Attacker | CAISD
Bamdad | CAISD
Bamdad | CAISD
Bamdad | CAISD
Follow
Apr 12
SSRF Attack — When the Server Becomes the Attacker | CAISD
#
aws
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
2 min read
Day 26: The Pentester's Playbook — Strategy, Keys, and Smart Pivoting 🕵️‍♂️
Devon Argent
Devon Argent
Devon Argent
Follow
Mar 20
Day 26: The Pentester's Playbook — Strategy, Keys, and Smart Pivoting 🕵️‍♂️
#
cybersecurity
#
infosec
#
linux
#
security
Comments
Add Comment
2 min read
#tag:-A Simple Recon Workflow for Beginner Bug Hunters
kato junior
kato junior
kato junior
Follow
Mar 20
#tag:-A Simple Recon Workflow for Beginner Bug Hunters
#
beginners
#
infosec
#
security
#
tutorial
Comments
Add Comment
1 min read
The 2026 Frontier: Why Tunneling is Now a Compliance Problem
InstaTunnel
InstaTunnel
InstaTunnel
Follow
Mar 22
The 2026 Frontier: Why Tunneling is Now a Compliance Problem
#
cybersecurity
#
infosec
#
networking
#
security
Comments
Add Comment
9 min read
GhostIntel v2.5 — What Changed Since I First Posted About It
Ruyynn
Ruyynn
Ruyynn
Follow
Mar 30
GhostIntel v2.5 — What Changed Since I First Posted About It
#
opensource
#
python
#
cybersecurity
#
infosec
1
 reaction
Comments
Add Comment
2 min read
Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems
Saranyo Deyasi
Saranyo Deyasi
Saranyo Deyasi
Follow
Mar 27
Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems
#
cybersecurity
#
infosec
#
psychology
#
security
1
 reaction
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account