Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 1 '25
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing
#
cybersecurity
#
securityawareness
#
humanfactors
#
infosec
3
 reactions
Comments
2
 comments
4 min read
PortSwigger's Top 10 Web Hacking Techniques of 2025 â A Deep Dive
Latent Breach
Latent Breach
Latent Breach
Follow
Feb 7
PortSwigger's Top 10 Web Hacking Techniques of 2025 â A Deep Dive
#
cybersecurity
#
infosec
#
security
#
web
6
 reactions
Comments
2
 comments
13 min read
Lab 03-01: When Malware Fights Back â Analyzing Poison Ivy's Anti-VM Evasion
Ramadhan Adam
Ramadhan Adam
Ramadhan Adam
Follow
Jan 6
Lab 03-01: When Malware Fights Back â Analyzing Poison Ivy's Anti-VM Evasion
#
malwareanalysis
#
reverseengineering
#
infosec
#
security
Comments
Add Comment
6 min read
THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations
KL3FT3Z
KL3FT3Z
KL3FT3Z
Follow
Dec 6 '25
THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations
#
cybersecurity
#
redteam
#
webdev
#
infosec
18
 reactions
Comments
Add Comment
5 min read
I Was Given a âJob Assignmentâ That Installed Malware
Michael M
Michael M
Michael M
Follow
Nov 10 '25
I Was Given a âJob Assignmentâ That Installed Malware
#
security
#
nodejs
#
npm
#
infosec
3
 reactions
Comments
Add Comment
2 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Nov 21 '25
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
#
threathunting
#
devops
#
security
#
infosec
6
 reactions
Comments
2
 comments
4 min read
đ Introducing VulnFeedâ-âReal-Time Vulnerability Tracking for CISA & Red Hat
Shresth Paul
Shresth Paul
Shresth Paul
Follow
Nov 3 '25
đ Introducing VulnFeedâ-âReal-Time Vulnerability Tracking for CISA & Red Hat
#
devsecops
#
cybersecurity
#
infosec
#
vulnerabilities
1
 reaction
Comments
1
 comment
1 min read
đ MANTA â A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)
Shresth Paul
Shresth Paul
Shresth Paul
Follow
Nov 20 '25
đ MANTA â A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)
#
malware
#
cybersecurity
#
infosec
#
githubactions
Comments
Add Comment
1 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Muhammad Taha Khan
Muhammad Taha Khan
Muhammad Taha Khan
Follow
Oct 20 '25
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
#
security
#
websecurity
#
infosec
Comments
Add Comment
4 min read
Cybersecurity Weekly#12: What Developers Should Care About This Week
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Dec 19 '25
Cybersecurity Weekly#12: What Developers Should Care About This Week
#
cybersecurity
#
webdev
#
devops
#
infosec
1
 reaction
Comments
Add Comment
2 min read
Whoâs Who in Cybersecurity: Understanding the Different Types of Threat Actors
NicolĂĄs
NicolĂĄs
NicolĂĄs
Follow
Oct 19 '25
Whoâs Who in Cybersecurity: Understanding the Different Types of Threat Actors
#
cybersecurity
#
beginners
#
infosec
#
security
1
 reaction
Comments
Add Comment
4 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
is*hosting
is*hosting
is*hosting
Follow
Nov 18 '25
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
#
bugbounty
#
hackerone
#
cybersecurity
#
infosec
Comments
Add Comment
3 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Seif Eldien Ahmad Mohammad
Follow
Oct 9 '25
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)
#
security
#
devops
#
iot
#
infosec
1
 reaction
Comments
Add Comment
2 min read
Why VPN Traffic Creates New Security Problems
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Dec 22 '25
Why VPN Traffic Creates New Security Problems
#
cybersecurity
#
infosec
#
vpn
Comments
1
 comment
3 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
Nelson
Nelson
Nelson
Follow
Dec 15 '25
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)
#
security
#
infosec
#
opensource
#
cicd
Comments
Add Comment
1 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account