Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Stop AI From Seeing What It Shouldnât: A Practical Guide to PII Safety
Sridhar CR
Sridhar CR
Sridhar CR
Follow
Nov 16 '25
Stop AI From Seeing What It Shouldnât: A Practical Guide to PII Safety
#
ai
#
agents
#
data
#
infosec
2
 reactions
Comments
1
 comment
5 min read
I Was Given a âJob Assignmentâ That Installed Malware
Michael M
Michael M
Michael M
Follow
Nov 10 '25
I Was Given a âJob Assignmentâ That Installed Malware
#
security
#
nodejs
#
npm
#
infosec
6
 reactions
Comments
Add Comment
2 min read
Bug Bounty Hunting for GenAI
ToxSec
ToxSec
ToxSec
Follow
Oct 6 '25
Bug Bounty Hunting for GenAI
#
bugbounty
#
cybersecurity
#
infosec
#
reporting
Comments
Add Comment
8 min read
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
GnomeMan4201
GnomeMan4201
GnomeMan4201
Follow
Nov 9 '25
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework
#
cybersecurity
#
redteam
#
infosec
#
offensivesecurity
Comments
Add Comment
5 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Oct 31 '25
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
#
cybersecurity
#
passwords
#
infosec
#
freelancers
1
 reaction
Comments
Add Comment
2 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
Giorgi Akhobadze
Giorgi Akhobadze
Giorgi Akhobadze
Follow
Sep 26 '25
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk
#
cybersecurity
#
forensics
#
infosec
#
malware
Comments
Add Comment
6 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Sep 24 '25
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
#
nhi
#
infosec
#
security
#
identity
Comments
Add Comment
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Follow
Oct 9 '25
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
#
security
#
devops
#
iot
#
infosec
1
 reaction
Comments
Add Comment
2 min read
Whoâs Who in Cybersecurity: Understanding the Different Types of Threat Actors
NicolĂĄs
NicolĂĄs
NicolĂĄs
Follow
Oct 19 '25
Whoâs Who in Cybersecurity: Understanding the Different Types of Threat Actors
#
cybersecurity
#
beginners
#
infosec
#
security
1
 reaction
Comments
Add Comment
4 min read
Industry-Specific Data Security: Protecting Sensitive Data Before Itâs Too Late
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 12 '25
Industry-Specific Data Security: Protecting Sensitive Data Before Itâs Too Late
#
infosec
#
cybersecurity
#
dataprotection
#
dataprivacy
1
 reaction
Comments
Add Comment
3 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 đ)
Keerthika K
Keerthika K
Keerthika K
Follow
Sep 4 '25
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 đ)
#
cybersecurity
#
programming
#
beginners
#
infosec
5
 reactions
Comments
Add Comment
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
Nvidia's AI Kill Chain
ToxSec
ToxSec
ToxSec
Follow
Oct 4 '25
Nvidia's AI Kill Chain
#
ai
#
killchain
#
infosec
#
cybersecurity
Comments
Add Comment
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 13 '25
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian
#
infosec
#
cybersecurity
#
webdev
#
dataprivacy
2
 reactions
Comments
Add Comment
3 min read
Dealing With Dependency Vulnerabilities
Buffolander
Buffolander
Buffolander
Follow
Aug 31 '25
Dealing With Dependency Vulnerabilities
#
infosec
#
vulnerabilities
#
node
Comments
Add Comment
4 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account