Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
phishing
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Your IDE is an Attack Vector
Peter Mulligan
Peter Mulligan
Peter Mulligan
Follow
Feb 12
Your IDE is an Attack Vector
#
vscode
#
security
#
phishing
#
tooling
34
 reactions
Comments
29
 comments
5 min read
$100K+ Returned â Wallet Access Restored (Adverting Case)
PhishDestroy
PhishDestroy
PhishDestroy
Follow
Aug 31 '25
$100K+ Returned â Wallet Access Restored (Adverting Case)
#
cybersecurity
#
web3
#
phishing
#
socialengineering
79
 reactions
Comments
Add Comment
3 min read
PhishDestroy: A Direct War on Phishing Operations
PhishDestroy
PhishDestroy
PhishDestroy
Follow
Aug 31 '25
PhishDestroy: A Direct War on Phishing Operations
#
phishing
#
cybersecurity
#
drainer
#
takedown
75
 reactions
Comments
Add Comment
3 min read
đŻ Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38
KL3FT3Z
KL3FT3Z
KL3FT3Z
Follow
Jan 17
đŻ Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38
#
cybersecurity
#
vscode
#
phishing
#
webdev
18
 reactions
Comments
Add Comment
11 min read
Cybersecurity Weekly #9: AI-Powered Phishing Inside Collaboration Tools
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Nov 21 '25
Cybersecurity Weekly #9: AI-Powered Phishing Inside Collaboration Tools
#
cybersecurity
#
remotework
#
aisecurity
#
phishing
2
 reactions
Comments
Add Comment
2 min read
Advent of Cyber 2025 Day 12 Writeup: Phishing | TryHackMe
Mahin Ahmad
Mahin Ahmad
Mahin Ahmad
Follow
Dec 31 '25
Advent of Cyber 2025 Day 12 Writeup: Phishing | TryHackMe
#
tryhackme
#
phishing
Comments
Add Comment
3 min read
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox đ§ đŠ
Willie Harris
Willie Harris
Willie Harris
Follow
Dec 14 '25
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox đ§ đŠ
#
cybersecurity
#
phishing
#
infosec
5
 reactions
Comments
Add Comment
4 min read
Rapid Deployment of Phishing Pattern Detection with Docker Under Tight Deadlines
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Rapid Deployment of Phishing Pattern Detection with Docker Under Tight Deadlines
#
docker
#
cybersecurity
#
phishing
Comments
Add Comment
2 min read
Phishing: The Complete Guide to Cyber Deception and Protection
Pragya Sapkota
Pragya Sapkota
Pragya Sapkota
Follow
Aug 31 '25
Phishing: The Complete Guide to Cyber Deception and Protection
#
phishing
#
webdev
#
cybersecurity
#
beginners
Comments
Add Comment
11 min read
đ Exploring WiâFi Security Safely: A BeginnerâFriendly Guide to the WiFiâLab Controller (with GUI!)
Sarah Varghese
Sarah Varghese
Sarah Varghese
Follow
Dec 5 '25
đ Exploring WiâFi Security Safely: A BeginnerâFriendly Guide to the WiFiâLab Controller (with GUI!)
#
cybersecurity
#
wifihack
#
phishing
#
opensource
5
 reactions
Comments
1
 comment
4 min read
If your "Unsubscribe" link requires users to login, you're training them to fall for phishing attacks
JoĂŁo L.
JoĂŁo L.
JoĂŁo L.
Follow
Jan 7
If your "Unsubscribe" link requires users to login, you're training them to fall for phishing attacks
#
email
#
phishing
Comments
Add Comment
2 min read
How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)
shiva shanker
shiva shanker
shiva shanker
Follow
Sep 10 '25
How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)
#
phishing
#
supplychainattack
#
security
#
javascript
27
 reactions
Comments
Add Comment
4 min read
đ¨ âGoogle Alert: Someone Just Logged In?â â Donât Fall for the Phishing Trap
Syber Secure
Syber Secure
Syber Secure
Follow
Jul 9 '25
đ¨ âGoogle Alert: Someone Just Logged In?â â Donât Fall for the Phishing Trap
#
cybersecurity
#
phishing
#
infosec
#
ethicalhacking
2
 reactions
Comments
Add Comment
3 min read
The Rise of AI-Generated Phishing Websites: How Hackers Are Weaponizing Generative Tools
Ranjan Majumdar
Ranjan Majumdar
Ranjan Majumdar
Follow
Jul 4 '25
The Rise of AI-Generated Phishing Websites: How Hackers Are Weaponizing Generative Tools
#
cybersecurity
#
ai
#
phishing
#
devsecops
Comments
Add Comment
4 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide
Zahir Fahmi
Zahir Fahmi
Zahir Fahmi
Follow
Jun 20 '25
How to Prevent Phishing Attacks: A Technical Implementation Guide
#
security
#
cybersecurity
#
phishing
#
email
Comments
Add Comment
2 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account