Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
I Was Given a “Job Assignment” That Installed Malware
Michael M
Michael M
Michael M
Follow
Nov 10 '25
I Was Given a “Job Assignment” That Installed Malware
#
security
#
nodejs
#
npm
#
infosec
3
 reactions
Comments
Add Comment
2 min read
DevSecOps: Modelo de madurez y alternativas de implementaciĂłn
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Follow
Oct 27 '25
DevSecOps: Modelo de madurez y alternativas de implementaciĂłn
#
devsecops
#
cybersecurity
#
infosec
#
security
5
 reactions
Comments
Add Comment
10 min read
Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Nov 29 '25
Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know
#
cybersecurity
#
security
#
infosec
#
ai
2
 reactions
Comments
Add Comment
4 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Muhammad Taha Khan
Muhammad Taha Khan
Muhammad Taha Khan
Follow
Oct 20 '25
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
#
security
#
websecurity
#
infosec
Comments
Add Comment
4 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities
SilentWire Cybersecurity
SilentWire Cybersecurity
SilentWire Cybersecurity
Follow
Nov 19 '25
The Real Reason Most Pentests Miss Critical Vulnerabilities
#
cybersecurity
#
infosec
#
cyber
#
career
1
 reaction
Comments
Add Comment
3 min read
Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety
Sridhar CR
Sridhar CR
Sridhar CR
Follow
Nov 16 '25
Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety
#
ai
#
agents
#
data
#
infosec
2
 reactions
Comments
1
 comment
5 min read
Bug Bounty Hunting for GenAI
ToxSec
ToxSec
ToxSec
Follow
Oct 6 '25
Bug Bounty Hunting for GenAI
#
bugbounty
#
cybersecurity
#
infosec
#
reporting
Comments
Add Comment
8 min read
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
GnomeMan4201
GnomeMan4201
GnomeMan4201
Follow
Nov 9 '25
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
#
cybersecurity
#
redteam
#
infosec
#
offensivesecurity
Comments
Add Comment
5 min read
Resolving an E-commerce DNS Hijack via a Compromised Cloudflare Account
MD Pabel
MD Pabel
MD Pabel
Follow
Feb 2
Resolving an E-commerce DNS Hijack via a Compromised Cloudflare Account
#
cybersecurity
#
infosec
#
networking
#
security
Comments
Add Comment
4 min read
How a Former Developer Hijacked a WordPress Site
MD Pabel
MD Pabel
MD Pabel
Follow
Feb 2
How a Former Developer Hijacked a WordPress Site
#
cybersecurity
#
infosec
#
security
#
wordpress
Comments
Add Comment
4 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Oct 31 '25
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
#
cybersecurity
#
passwords
#
infosec
#
freelancers
1
 reaction
Comments
Add Comment
2 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Giorgi Akhobadze
Giorgi Akhobadze
Giorgi Akhobadze
Follow
Sep 26 '25
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
#
cybersecurity
#
forensics
#
infosec
#
malware
Comments
Add Comment
6 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Sep 24 '25
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
#
nhi
#
infosec
#
security
#
identity
Comments
Add Comment
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Follow
Oct 9 '25
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
#
security
#
devops
#
iot
#
infosec
1
 reaction
Comments
Add Comment
2 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors
Nicolás
Nicolás
Nicolás
Follow
Oct 19 '25
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors
#
cybersecurity
#
beginners
#
infosec
#
security
1
 reaction
Comments
Add Comment
4 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account