Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Tech Horror Codex: Vendor Lock‑In
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 1
Tech Horror Codex: Vendor Lock‑In
#
devops
#
cloudcomputing
#
infosec
#
sre
Comments
Add Comment
2 min read
Forensic Analysis: The Unverified Backend of DIVEXA
Nezahualpilli Tlapalco
Nezahualpilli Tlapalco
Nezahualpilli Tlapalco
Follow
Dec 28 '25
Forensic Analysis: The Unverified Backend of DIVEXA
#
digitalforensics
#
infosec
#
divexa
#
cybersecurity
Comments
Add Comment
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good IntentionsÂ
Mark0
Mark0
Mark0
Follow
Jan 30
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good IntentionsÂ
#
cybersecurity
#
infosec
#
socialengineering
#
microsoft365
1
 reaction
Comments
Add Comment
1 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)
Arashad Dodhiya
Arashad Dodhiya
Arashad Dodhiya
Follow
Dec 24 '25
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)
#
cybersecurity
#
linux
#
infosec
#
learninginpublic
Comments
Add Comment
3 min read
When App Privacy Rules Become Platform Power Levers
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Dec 23 '25
When App Privacy Rules Become Platform Power Levers
#
cybersecurity
#
infosec
Comments
Add Comment
4 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
Tauseef imam
Tauseef imam
Tauseef imam
Follow
Jan 26
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
#
cybersecurity
#
hacker
#
security
#
infosec
1
 reaction
Comments
2
 comments
5 min read
Corporate Wargames: Red Teams vs Blue Teams
Bernie
Bernie
Bernie
Follow
Jan 26
Corporate Wargames: Red Teams vs Blue Teams
#
beginners
#
cybersecurity
#
infosec
#
security
2
 reactions
Comments
Add Comment
3 min read
The USB that Changed Warfare: Lessons from Stuxnet
Ajibola jr.
Ajibola jr.
Ajibola jr.
Follow
Jan 25
The USB that Changed Warfare: Lessons from Stuxnet
#
discuss
#
infosec
#
cybersecurity
#
msccybersecurity
Comments
Add Comment
2 min read
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Jan 23
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
#
cybersecurity
#
websecurity
#
freelancers
#
infosec
4
 reactions
Comments
1
 comment
1 min read
Master Active Directory: Attacktive Directory (TryHackMe) Walkthrough
zerogru Art of Vector
zerogru Art of Vector
zerogru Art of Vector
Follow
Jan 21
Master Active Directory: Attacktive Directory (TryHackMe) Walkthrough
#
security
#
tutorial
#
activedirectory
#
infosec
Comments
Add Comment
2 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
Nelson
Nelson
Nelson
Follow
Dec 15 '25
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
#
security
#
infosec
#
opensource
#
cicd
Comments
Add Comment
1 min read
Making Linux Work as a Corporate Desktop
Richard Chamberlain
Richard Chamberlain
Richard Chamberlain
Follow
Jan 18
Making Linux Work as a Corporate Desktop
#
cybersecurity
#
flatpak
#
ostree
#
infosec
2
 reactions
Comments
Add Comment
2 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
Tarek CHEIKH
Tarek CHEIKH
Tarek CHEIKH
Follow
Jan 15
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
#
security
#
awss3
#
aws
#
infosec
Comments
Add Comment
13 min read
Why VPN Traffic Creates New Security Problems
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Dec 22 '25
Why VPN Traffic Creates New Security Problems
#
cybersecurity
#
infosec
#
vpn
Comments
1
 comment
3 min read
A Breakdown of Darkweb Exit Scams & Their Warning Signs
Tor BBB
Tor BBB
Tor BBB
Follow
Dec 8 '25
A Breakdown of Darkweb Exit Scams & Their Warning Signs
#
darkweb
#
cybersecurity
#
osint
#
infosec
Comments
Add Comment
1 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account