DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How Anomaly Detection Actually Works in Security Operations

How Anomaly Detection Actually Works in Security Operations

Comments
5 min read
I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them

I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them

Comments
8 min read
PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution

PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution

1
Comments
1 min read
2026 Post-Quantum Tunnels: Fighting Harvest Now, Decrypt Later

2026 Post-Quantum Tunnels: Fighting Harvest Now, Decrypt Later

1
Comments
11 min read
AI Chatbot Hack: Two‑Hour Breach Rewrites Security

AI Chatbot Hack: Two‑Hour Breach Rewrites Security

Comments
7 min read
AI Agent Hack: Prompt‑Layer Security Is the Real Threat

AI Agent Hack: Prompt‑Layer Security Is the Real Threat

Comments
7 min read
The Security Crisis Hiding Inside Machine Identities

The Security Crisis Hiding Inside Machine Identities

1
Comments
5 min read
Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️

Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️

Comments
1 min read
Hack The Box - Snapped Writeup

Hack The Box - Snapped Writeup

2
Comments
6 min read
SSRF Attack — When the Server Becomes the Attacker | CAISD

SSRF Attack — When the Server Becomes the Attacker | CAISD

Comments
2 min read
Day 26: The Pentester's Playbook — Strategy, Keys, and Smart Pivoting 🕵️‍♂️

Day 26: The Pentester's Playbook — Strategy, Keys, and Smart Pivoting 🕵️‍♂️

Comments
2 min read
#tag:-A Simple Recon Workflow for Beginner Bug Hunters

#tag:-A Simple Recon Workflow for Beginner Bug Hunters

Comments
1 min read
The 2026 Frontier: Why Tunneling is Now a Compliance Problem

The 2026 Frontier: Why Tunneling is Now a Compliance Problem

Comments
9 min read
GhostIntel v2.5 — What Changed Since I First Posted About It

GhostIntel v2.5 — What Changed Since I First Posted About It

1
Comments
2 min read
Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems

Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.