DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

6
Comments 2
13 min read
The Art of Operational Indistinguishability

The Art of Operational Indistinguishability

1
Comments
11 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Comments
1 min read
Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass

Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass

Comments
1 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

1
Comments 2
5 min read
The First Full-Scale Cyber War: 4 Years of Lessons

The First Full-Scale Cyber War: 4 Years of Lessons

Comments
7 min read
Corporate Wargames: Red Teams vs Blue Teams

Corporate Wargames: Red Teams vs Blue Teams

2
Comments
3 min read
Making Linux Work as a Corporate Desktop

Making Linux Work as a Corporate Desktop

2
Comments
2 min read
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
How My Phone Was Taken Over

How My Phone Was Taken Over

1
Comments
2 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
The USB that Changed Warfare: Lessons from Stuxnet

The USB that Changed Warfare: Lessons from Stuxnet

Comments
2 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.