DEV Community

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Importance of International Cybersecurity Alliances and Cooperation

The Importance of International Cybersecurity Alliances and Cooperation

Comments
5 min read
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
OAuth Consent Phishing: When “Allow Access” Becomes the Breach

OAuth Consent Phishing: When “Allow Access” Becomes the Breach

1
Comments
1 min read
Investigation into Malicious WordPress Core Plugin

Investigation into Malicious WordPress Core Plugin

Comments
2 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Comments
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

Comments
1 min read
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

1
Comments 1
1 min read
The First Full-Scale Cyber War: 4 Years of Lessons

The First Full-Scale Cyber War: 4 Years of Lessons

Comments
7 min read
The USB that Changed Warfare: Lessons from Stuxnet

The USB that Changed Warfare: Lessons from Stuxnet

Comments
2 min read
Master Active Directory: Attacktive Directory (TryHackMe) Walkthrough

Master Active Directory: Attacktive Directory (TryHackMe) Walkthrough

Comments
2 min read
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes

Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes

Comments
3 min read
Purple Teaming, Or: Why Siloed Teams Fail

Purple Teaming, Or: Why Siloed Teams Fail

1
Comments
5 min read
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
I Found a Hidden “Backdoor” in a Client’s WordPress Site

I Found a Hidden “Backdoor” in a Client’s WordPress Site

Comments
4 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
WP Compatibility Patch Backdoor

WP Compatibility Patch Backdoor

Comments
2 min read
The Art of Operational Indistinguishability

The Art of Operational Indistinguishability

1
Comments
11 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Comments
2 min read
Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Comments
4 min read
Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
loading...