Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
phishing
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Drained for $7.95 â How a Solana Phishing Attack Became a Multi-Chain AML Platform
Kenzo ARAI
Kenzo ARAI
Kenzo ARAI
Follow
Apr 29
Drained for $7.95 â How a Solana Phishing Attack Became a Multi-Chain AML Platform
#
blockchain
#
security
#
solana
#
phishing
Comments
Add Comment
6 min read
European Commission AWS Compromise: Identity Boundary Failure Confirmed
RC
RC
RC
Follow
Apr 20
European Commission AWS Compromise: Identity Boundary Failure Confirmed
#
cybersecurity
#
cloudsecurity
#
phishing
#
identitymanagement
Comments
Add Comment
2 min read
The Evolution of Token Hijacking: AI-Powered OAuth Device Code Phishing
Saravana kumar
Saravana kumar
Saravana kumar
Follow
for
Cryip
Apr 8
The Evolution of Token Hijacking: AI-Powered OAuth Device Code Phishing
#
phishing
#
microsoft
#
ai
Comments
Add Comment
3 min read
Starkiller Phishing: How MFA-Bypass Reverse-Proxies Became a Service
rain
rain
rain
Follow
Mar 30
Starkiller Phishing: How MFA-Bypass Reverse-Proxies Became a Service
#
phishing
#
mfabypass
#
reverseproxy
#
security
Comments
Add Comment
6 min read
Ethical Phishing Simulations: Balancing Security Training and Legal Compliance in Authorized Environments
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 28
Ethical Phishing Simulations: Balancing Security Training and Legal Compliance in Authorized Environments
#
cybersecurity
#
phishing
#
aitm
#
compliance
Comments
Add Comment
12 min read
PART 2: I Published a Scam Expose. NetEase Sent a Takedown Request. Then They Rewrote Their Entire Operation.
freerave
freerave
freerave
Follow
Apr 29
PART 2: I Published a Scam Expose. NetEase Sent a Takedown Request. Then They Rewrote Their Entire Operation.
#
cybersecurity
#
security
#
phishing
#
webdev
Comments
Add Comment
11 min read
The Science Behind Scam Detection: How Tools Like ScamAlerts Work
James Smith
James Smith
James Smith
Follow
Apr 6
The Science Behind Scam Detection: How Tools Like ScamAlerts Work
#
cybersecurity
#
machinelearning
#
technology
#
phishing
Comments
Add Comment
8 min read
AitM Phishing 2026: How Starkiller and Tycoon 2FA Bypass Your MFA
IAMDevBox
IAMDevBox
IAMDevBox
Follow
Mar 22
AitM Phishing 2026: How Starkiller and Tycoon 2FA Bypass Your MFA
#
phishing
#
mfa
#
passkeys
#
fido2
Comments
Add Comment
5 min read
Advanced Cybersecurity: How Attackers Break In and How to Stop Them
Abhishek Nair
Abhishek Nair
Abhishek Nair
Follow
Mar 15
Advanced Cybersecurity: How Attackers Break In and How to Stop Them
#
cybersecurity
#
phishing
#
ransomware
#
socialengineering
Comments
Add Comment
12 min read
EXPOSED: The Youdao Ads Influencer Marketing Scam - Technical Analysis & Red Flags
freerave
freerave
freerave
Follow
Apr 11
EXPOSED: The Youdao Ads Influencer Marketing Scam - Technical Analysis & Red Flags
#
cybersecurity
#
scam
#
phishing
#
security
1
 reaction
Comments
2
 comments
5 min read
Lazarus Group's 19-Day A/B Test: How North Korean APT Pivoted from Airdrops to Fake CVEs to Dream Jobs
KL3FT3Z
KL3FT3Z
KL3FT3Z
Follow
Apr 8
Lazarus Group's 19-Day A/B Test: How North Korean APT Pivoted from Airdrops to Fake CVEs to Dream Jobs
#
cybersecurity
#
security
#
webdev
#
phishing
18
 reactions
Comments
5
 comments
8 min read
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
JP Dias
JP Dias
JP Dias
Follow
Mar 17
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
#
phishing
#
malware
#
rat
#
infosec
Comments
Add Comment
10 min read
Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 4
Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites
#
phishing
#
cloud
#
security
#
exploitation
Comments
Add Comment
8 min read
Fake Google Security Alert Installs PWA That Steals MFA Codes
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Mar 3
Fake Google Security Alert Installs PWA That Steals MFA Codes
#
phishing
#
mfa
#
browsersecurity
#
progressivewebapp
Comments
Add Comment
4 min read
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims
Mr. 0x1
Mr. 0x1
Mr. 0x1
Follow
Mar 20
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims
#
security
#
rust
#
reverseengineering
#
phishing
5
 reactions
Comments
Add Comment
7 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account