Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
phishing
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Your IDE is an Attack Vector
Peter Mulligan
Peter Mulligan
Peter Mulligan
Follow
Feb 12
Your IDE is an Attack Vector
#
vscode
#
security
#
phishing
#
tooling
25
 reactions
Comments
16
 comments
5 min read
I Run a Cybersecurity Websiteâand Still Get These Phishing Emails. Hereâs How to Spot Them Instantly
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Feb 9
I Run a Cybersecurity Websiteâand Still Get These Phishing Emails. Hereâs How to Spot Them Instantly
#
cybersecurity
#
phishing
#
infosec
#
smallbusinesses
1
 reaction
Comments
Add Comment
1 min read
Detecting Phishing Patterns Through Web Scraping on a Zero-Budget
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Detecting Phishing Patterns Through Web Scraping on a Zero-Budget
#
security
#
webscraping
#
phishing
Comments
Add Comment
3 min read
Leveraging Kubernetes for Advanced Phishing Pattern Detection in Enterprise Environments
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Leveraging Kubernetes for Advanced Phishing Pattern Detection in Enterprise Environments
#
kubernetes
#
cybersecurity
#
phishing
Comments
Add Comment
2 min read
Detecting Phishing Patterns with Zero-Budget API Development
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Detecting Phishing Patterns with Zero-Budget API Development
#
security
#
api
#
phishing
Comments
Add Comment
2 min read
Detecting Phishing Patterns in React: A Practical Approach Without Documentation
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Detecting Phishing Patterns in React: A Practical Approach Without Documentation
#
react
#
security
#
phishing
Comments
Add Comment
2 min read
Detecting Phishing Patterns in Legacy JavaScript Codebases: A Security Researcherâs Approach
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Detecting Phishing Patterns in Legacy JavaScript Codebases: A Security Researcherâs Approach
#
security
#
javascript
#
phishing
Comments
Add Comment
2 min read
Leveraging React and Behavioral Analytics to Detect Phishing Patterns in Enterprise Environments
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Leveraging React and Behavioral Analytics to Detect Phishing Patterns in Enterprise Environments
#
security
#
react
#
phishing
Comments
Add Comment
2 min read
Rapid Detection of Phishing Patterns in Node.js: A Senior Architectâs Approach Under Tight Deadlines
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Rapid Detection of Phishing Patterns in Node.js: A Senior Architectâs Approach Under Tight Deadlines
#
node
#
cybersecurity
#
phishing
Comments
Add Comment
2 min read
Rapid API-Driven Solutions for Detecting Phishing Patterns Under Tight Deadlines
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Rapid API-Driven Solutions for Detecting Phishing Patterns Under Tight Deadlines
#
api
#
cybersecurity
#
phishing
Comments
Add Comment
3 min read
Harnessing Linux for Real-Time Phishing Pattern Detection During High Traffic Events
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Harnessing Linux for Real-Time Phishing Pattern Detection During High Traffic Events
#
security
#
linux
#
phishing
Comments
Add Comment
3 min read
Rapid Phishing Pattern Detection with Python: A Security Researcherâs Approach Under Tight Deadlines
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Rapid Phishing Pattern Detection with Python: A Security Researcherâs Approach Under Tight Deadlines
#
security
#
python
#
phishing
Comments
Add Comment
3 min read
Leveraging Linux for Intelligent Detection of Phishing Patterns in Enterprise Environments
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Leveraging Linux for Intelligent Detection of Phishing Patterns in Enterprise Environments
#
security
#
linux
#
phishing
Comments
Add Comment
3 min read
Building a High-Performance Phishing Pattern Detector in Go for High Traffic Events
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Building a High-Performance Phishing Pattern Detector in Go for High Traffic Events
#
security
#
go
#
phishing
Comments
Add Comment
3 min read
Mitigating Phishing Attacks During High Traffic Events with Cybersecurity and DevOps Strategies
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Mitigating Phishing Attacks During High Traffic Events with Cybersecurity and DevOps Strategies
#
devops
#
cybersecurity
#
phishing
Comments
Add Comment
2 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account