DEV Community

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

Comments
1 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities

The Real Reason Most Pentests Miss Critical Vulnerabilities

1
Comments
3 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
I Was Given a “Job Assignment” That Installed Malware

I Was Given a “Job Assignment” That Installed Malware

3
Comments
2 min read
DevSecOps: Modelo de madurez y alternativas de implementación

DevSecOps: Modelo de madurez y alternativas de implementación

5
Comments
10 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Comments
4 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

1
Comments
2 min read
Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety

Stop AI From Seeing What It Shouldn’t: A Practical Guide to PII Safety

2
Comments
5 min read
Bug Bounty Hunting for GenAI

Bug Bounty Hunting for GenAI

Comments
8 min read
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

Comments
5 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Comments
6 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Comments
7 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)

How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)

1
Comments
2 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

1
Comments
4 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

1
Comments
3 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

5
Comments
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters

Patch Management vs Vulnerability Management: Why the Difference Matters

1
Comments
5 min read
Nvidia's AI Kill Chain

Nvidia's AI Kill Chain

Comments
4 min read
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

2
Comments
3 min read
Dealing With Dependency Vulnerabilities

Dealing With Dependency Vulnerabilities

Comments
4 min read
Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?

Et si votre infrastructure était infiltrée depuis 6 mois sans que vous ne le sachiez ?

1
Comments
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Comments
3 min read
Security Principles

Security Principles

Comments
11 min read
loading...