Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
phishing
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
EXPOSED: The Youdao Ads Influencer Marketing Scam - Technical Analysis & Red Flags
freerave
freerave
freerave
Follow
Apr 11
EXPOSED: The Youdao Ads Influencer Marketing Scam - Technical Analysis & Red Flags
#
cybersecurity
#
scam
#
phishing
#
security
Comments
Add Comment
5 min read
The Evolution of Token Hijacking: AI-Powered OAuth Device Code Phishing
Saravana kumar
Saravana kumar
Saravana kumar
Follow
for
Cryip
Apr 8
The Evolution of Token Hijacking: AI-Powered OAuth Device Code Phishing
#
phishing
#
microsoft
#
ai
Comments
Add Comment
3 min read
Starkiller Phishing: How MFA-Bypass Reverse-Proxies Became a Service
rain
rain
rain
Follow
Mar 30
Starkiller Phishing: How MFA-Bypass Reverse-Proxies Became a Service
#
phishing
#
mfabypass
#
reverseproxy
#
security
Comments
Add Comment
6 min read
Ethical Phishing Simulations: Balancing Security Training and Legal Compliance in Authorized Environments
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 28
Ethical Phishing Simulations: Balancing Security Training and Legal Compliance in Authorized Environments
#
cybersecurity
#
phishing
#
aitm
#
compliance
Comments
Add Comment
12 min read
The Science Behind Scam Detection: How Tools Like ScamAlerts Work
James Smith
James Smith
James Smith
Follow
Apr 6
The Science Behind Scam Detection: How Tools Like ScamAlerts Work
#
cybersecurity
#
machinelearning
#
technology
#
phishing
Comments
Add Comment
8 min read
AitM Phishing 2026: How Starkiller and Tycoon 2FA Bypass Your MFA
IAMDevBox
IAMDevBox
IAMDevBox
Follow
Mar 22
AitM Phishing 2026: How Starkiller and Tycoon 2FA Bypass Your MFA
#
phishing
#
mfa
#
passkeys
#
fido2
Comments
Add Comment
5 min read
Advanced Cybersecurity: How Attackers Break In and How to Stop Them
Abhishek Nair
Abhishek Nair
Abhishek Nair
Follow
Mar 15
Advanced Cybersecurity: How Attackers Break In and How to Stop Them
#
cybersecurity
#
phishing
#
ransomware
#
socialengineering
Comments
Add Comment
12 min read
Lazarus Group's 19-Day A/B Test: How North Korean APT Pivoted from Airdrops to Fake CVEs to Dream Jobs
KL3FT3Z
KL3FT3Z
KL3FT3Z
Follow
Apr 8
Lazarus Group's 19-Day A/B Test: How North Korean APT Pivoted from Airdrops to Fake CVEs to Dream Jobs
#
cybersecurity
#
security
#
webdev
#
phishing
13
 reactions
Comments
5
 comments
8 min read
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
JP Dias
JP Dias
JP Dias
Follow
Mar 17
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
#
phishing
#
malware
#
rat
#
infosec
Comments
Add Comment
10 min read
Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 4
Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites
#
phishing
#
cloud
#
security
#
exploitation
Comments
Add Comment
8 min read
Fake Google Security Alert Installs PWA That Steals MFA Codes
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Mar 3
Fake Google Security Alert Installs PWA That Steals MFA Codes
#
phishing
#
mfa
#
browsersecurity
#
progressivewebapp
Comments
Add Comment
4 min read
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims
Mr. 0x1
Mr. 0x1
Mr. 0x1
Follow
Mar 20
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims
#
security
#
rust
#
reverseengineering
#
phishing
5
 reactions
Comments
Add Comment
7 min read
đ Why SPF, DKIM & DMARC Are Essential for Email Security
Ibrahim S
Ibrahim S
Ibrahim S
Follow
Feb 25
đ Why SPF, DKIM & DMARC Are Essential for Email Security
#
ibbus
#
dmarc
#
phishing
#
cybersecurity
1
 reaction
Comments
Add Comment
3 min read
Rapid Deployment of Phishing Pattern Detection with Docker Under Tight Deadlines
Mohammad Waseem
Mohammad Waseem
Mohammad Waseem
Follow
Feb 3
Rapid Deployment of Phishing Pattern Detection with Docker Under Tight Deadlines
#
docker
#
cybersecurity
#
phishing
Comments
Add Comment
2 min read
Your IDE is an Attack Vector
Peter Mulligan
Peter Mulligan
Peter Mulligan
Follow
Feb 12
Your IDE is an Attack Vector
#
vscode
#
security
#
phishing
#
tooling
51
 reactions
Comments
52
 comments
5 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account