Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
The Open-Source Backdoor That Almost Compromised SSH
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Apr 24
The Open-Source Backdoor That Almost Compromised SSH
#
security
#
infosec
#
opensource
#
github
1
 reaction
Comments
Add Comment
3 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Feb 21
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
8 min read
A simple tip to find hidden gems in Shodan
Bruno
Bruno
Bruno
Follow
Mar 3
A simple tip to find hidden gems in Shodan
#
security
#
infosec
#
cybersecurity
Comments
Add Comment
2 min read
Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Feb 24
Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability
#
cybersecurity
#
infosec
#
vulnerabilities
#
cve
Comments
Add Comment
39 min read
What is Information Security Threats
Hussain kadiwal
Hussain kadiwal
Hussain kadiwal
Follow
Feb 11
What is Information Security Threats
#
infosec
#
security
#
threat
#
hacking
Comments
Add Comment
2 min read
Understanding the Twitter Hack of 2020: A Deep Dive
Nikita Koselev
Nikita Koselev
Nikita Koselev
Follow
Jan 4
Understanding the Twitter Hack of 2020: A Deep Dive
#
twitterhack
#
cybersecurity
#
socialengineering
#
infosec
2
 reactions
Comments
Add Comment
2 min read
What is Infrastructure Security?
Donesrom
Donesrom
Donesrom
Follow
Jan 3
What is Infrastructure Security?
#
security
#
infrastructuresecurity
#
cybersecurity
#
infosec
1
 reaction
Comments
Add Comment
7 min read
What is DNS Security? How Does it Work?
Donesrom
Donesrom
Donesrom
Follow
Dec 18 '23
What is DNS Security? How Does it Work?
#
dns
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
2
 comments
6 min read
Securing AWS Environments Against Ransomware
Wilklins Nyatteng
Wilklins Nyatteng
Wilklins Nyatteng
Follow
for
AWS Community Builders
Nov 23 '23
Securing AWS Environments Against Ransomware
#
awssecurity
#
ransomware
#
infosec
#
cloudsecurity
8
 reactions
Comments
Add Comment
3 min read
Securing Your Applications on AWS: Guide to Data Privacy and Protection
Wilklins Nyatteng
Wilklins Nyatteng
Wilklins Nyatteng
Follow
for
AWS Community Builders
Nov 27 '23
Securing Your Applications on AWS: Guide to Data Privacy and Protection
#
aws
#
appsec
#
infosec
#
devsecops
5
 reactions
Comments
Add Comment
3 min read
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Nov 23 '23
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
Comments
Add Comment
8 min read
What is a Hacker? Types, Skills Every Thing You Need to Know
Prakash Tiwari
Prakash Tiwari
Prakash Tiwari
Follow
Nov 1 '23
What is a Hacker? Types, Skills Every Thing You Need to Know
#
beginners
#
infosec
#
hackathon
#
learning
1
 reaction
Comments
Add Comment
6 min read
KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 9 '23
KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784
#
poc
#
cybersecurity
#
infosec
#
vulnerabilities
7
 reactions
Comments
Add Comment
4 min read
Exploring the Dark Webâs Hidden Secrets
Arun Ammisetty
Arun Ammisetty
Arun Ammisetty
Follow
Oct 7 '23
Exploring the Dark Webâs Hidden Secrets
#
cybersecurity
#
infosec
#
privacy
#
darkweb
1
 reaction
Comments
Add Comment
14 min read
Interesting Software Vulns
Rake
Rake
Rake
Follow
Aug 31 '23
Interesting Software Vulns
#
vulnerabilities
#
infosec
#
appsec
#
cybersecurity
Comments
Add Comment
3 min read
An Introduction for Developers to Information Security
Mahdi Chaari
Mahdi Chaari
Mahdi Chaari
Follow
Aug 26 '23
An Introduction for Developers to Information Security
#
security
#
infosec
#
development
#
softwareengineering
4
 reactions
Comments
Add Comment
6 min read
Hands-On-Lab: Introduction To IAM
Wilklins Nyatteng
Wilklins Nyatteng
Wilklins Nyatteng
Follow
for
AWS Community Builders
Aug 16 '23
Hands-On-Lab: Introduction To IAM
#
aws
#
iam
#
infosec
#
cloudskills
6
 reactions
Comments
1
 comment
6 min read
Single Sign-On (SSO): The Key to Secure and Convenient Modern Authentication
Donesrom
Donesrom
Donesrom
Follow
Aug 14 '23
Single Sign-On (SSO): The Key to Secure and Convenient Modern Authentication
#
sso
#
cybersecurity
#
infosec
1
 reaction
Comments
Add Comment
7 min read
SQL injection in Rails - Learn from an attackerâs shoes
Haseeb Annadamban
Haseeb Annadamban
Haseeb Annadamban
Follow
Aug 4 '23
SQL injection in Rails - Learn from an attackerâs shoes
#
rails
#
security
#
infosec
5
 reactions
Comments
Add Comment
6 min read
Rails Security Best Practices: Protecting Your Applications from Common Threats - Index
Haseeb Annadamban
Haseeb Annadamban
Haseeb Annadamban
Follow
Aug 2 '23
Rails Security Best Practices: Protecting Your Applications from Common Threats - Index
#
rails
#
security
#
infosec
2
 reactions
Comments
Add Comment
1 min read
Critical Analysis: Unraveling the Apache RocketMQ Remote Code Execution Vulnerability (CVE-2023-33246)
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Jul 28 '23
Critical Analysis: Unraveling the Apache RocketMQ Remote Code Execution Vulnerability (CVE-2023-33246)
#
cybersecurity
#
infosec
#
apache
#
informationsecurity
Comments
Add Comment
7 min read
Talking about JSONP Hijacking Vulnerability
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Jul 22 '23
Talking about JSONP Hijacking Vulnerability
#
json
#
cybersecurity
#
infosec
#
beginners
2
 reactions
Comments
Add Comment
3 min read
Bypassing PHP WAF to Achieve Remote Code Execution In-Depth Analysis
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Jul 21 '23
Bypassing PHP WAF to Achieve Remote Code Execution In-Depth Analysis
#
php
#
cybersecurity
#
infosec
#
vulnerabilities
Comments
Add Comment
5 min read
Unveiling the Sudo Heap Overflow Vulnerability (CVE-2021-3156): A Critical Security Flaw Reappears
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Jul 12 '23
Unveiling the Sudo Heap Overflow Vulnerability (CVE-2021-3156): A Critical Security Flaw Reappears
#
cybersecurity
#
infosec
#
linux
#
cve
1
 reaction
Comments
Add Comment
13 min read
Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts
TutorialBoy
TutorialBoy
TutorialBoy
Follow
May 8 '23
Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts
#
cybersecurity
#
infosec
#
informationsecurity
#
opensource
9
 reactions
Comments
Add Comment
4 min read
The Summary Of Spring Security Authorization Bypass on Java
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Apr 27 '23
The Summary Of Spring Security Authorization Bypass on Java
#
cybersecurity
#
vulnerabilities
#
infosec
#
springboot
Comments
Add Comment
12 min read
How to automate compliance checks with AWS Audit Manager
Wilklins Nyatteng
Wilklins Nyatteng
Wilklins Nyatteng
Follow
for
AWS Community Builders
Apr 26 '23
How to automate compliance checks with AWS Audit Manager
#
aws
#
cloudaudit
#
infosec
2
 reactions
Comments
Add Comment
5 min read
WebLogic Deserialization Vulnerability - CVE-2023-21839
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Apr 26 '23
WebLogic Deserialization Vulnerability - CVE-2023-21839
#
cybersecurity
#
infosec
#
cve
Comments
Add Comment
3 min read
Protecting Your Cloud Infrastructure: AWS Native Security Strategies.
Wilklins Nyatteng
Wilklins Nyatteng
Wilklins Nyatteng
Follow
for
AWS Community Builders
Apr 11 '23
Protecting Your Cloud Infrastructure: AWS Native Security Strategies.
#
aws
#
infosec
#
cloudnative
#
cloudsecurity
Comments
Add Comment
4 min read
How I obtained my CISSP
Toul
Toul
Toul
Follow
Jan 25 '23
How I obtained my CISSP
#
cybersecurity
#
career
#
infosec
#
security
2
 reactions
Comments
Add Comment
4 min read
A Brief Introduction to SAML Security Vector
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Nov 16 '22
A Brief Introduction to SAML Security Vector
#
saml
#
bugbounty
#
cybersecurity
#
infosec
8
 reactions
Comments
Add Comment
29 min read
A Beginnerâs Guide to Understanding & Recognizing Different Cyber Threats
Losalini Rokocakau
Losalini Rokocakau
Losalini Rokocakau
Follow
Nov 7 '22
A Beginnerâs Guide to Understanding & Recognizing Different Cyber Threats
#
beginners
#
cybersecurity
#
infosec
#
informationsecurity
4
 reactions
Comments
Add Comment
5 min read
Android Security : A Checklist For Exploiting WebView
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 29 '22
Android Security : A Checklist For Exploiting WebView
#
cybersecurity
#
infosec
#
android
#
informationsecurity
2
 reactions
Comments
Add Comment
11 min read
Spring Actuator - Finding Actuators using Static Code Analysis - Part 2
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 29 '22
Spring Actuator - Finding Actuators using Static Code Analysis - Part 2
#
cybersecurity
#
infosec
#
security
#
informationsecurity
1
 reaction
Comments
Add Comment
10 min read
đȘ Grype jq tricks : csv for spreadsheets đ
adriens
adriens
adriens
Follow
for
opt-nc
Oct 18 '22
đȘ Grype jq tricks : csv for spreadsheets đ
#
docker
#
security
#
devops
#
infosec
4
 reactions
Comments
4
 comments
1 min read
Logging in, a thing we all hate
Isaac Lyman
Isaac Lyman
Isaac Lyman
Follow
Oct 8 '22
Logging in, a thing we all hate
#
infosec
#
security
#
ux
25
 reactions
Comments
3
 comments
11 min read
Web Pentesting Learning - Beginner edition
J2RGEZ
J2RGEZ
J2RGEZ
Follow
for
The Agile Monkeys
Sep 1 '22
Web Pentesting Learning - Beginner edition
#
pentesting
#
security
#
infosec
12
 reactions
Comments
Add Comment
3 min read
On the hook of a phisher
JP Dias
JP Dias
JP Dias
Follow
Nov 4 '22
On the hook of a phisher
#
infosec
#
phishing
#
security
1
 reaction
Comments
Add Comment
9 min read
Simple CTF - TryHackMe Walk Through
ChigozieCO
ChigozieCO
ChigozieCO
Follow
Jul 6 '22
Simple CTF - TryHackMe Walk Through
#
tryhackme
#
cybersecurity
#
ctf
#
infosec
8
 reactions
Comments
Add Comment
5 min read
đïž Docker image security scan automation with GH issues
adriens
adriens
adriens
Follow
for
opt-nc
Jun 23 '22
đïž Docker image security scan automation with GH issues
#
docker
#
devops
#
infosec
#
devsecops
7
 reactions
Comments
8
 comments
3 min read
HackTheBox Pandora Walkthrough
Krishna
Krishna
Krishna
Follow
May 27 '22
HackTheBox Pandora Walkthrough
#
hackthebox
#
infosec
#
ctf
#
security
5
 reactions
Comments
Add Comment
17 min read
Setting up reconftw
darkmage
darkmage
darkmage
Follow
May 19 '22
Setting up reconftw
#
hacking
#
infosec
#
bugbounty
#
linux
12
 reactions
Comments
Add Comment
9 min read
Network Traffic Observability: Three PacketStreamer Use Cases
Deepfence
Deepfence
Deepfence
Follow
May 9 '22
Network Traffic Observability: Three PacketStreamer Use Cases
#
devsecops
#
infosec
#
appsec
#
cybersecurity
5
 reactions
Comments
Add Comment
3 min read
đïž Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ?
adriens
adriens
adriens
Follow
for
opt-nc
May 5 '22
đïž Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ?
#
docker
#
java
#
infosec
#
devops
3
 reactions
Comments
1
 comment
1 min read
OhjelmistokehittÀjÀstÀ eettiseksi hakkeriksi
minjakoodaa
minjakoodaa
minjakoodaa
Follow
Mar 29 '22
OhjelmistokehittÀjÀstÀ eettiseksi hakkeriksi
#
career
#
security
#
womenintech
#
infosec
3
 reactions
Comments
Add Comment
2 min read
âïž Bench (and choose) Java-8 docker images with anchore/grype
adriens
adriens
adriens
Follow
for
opt-nc
Apr 25 '22
âïž Bench (and choose) Java-8 docker images with anchore/grype
#
docker
#
security
#
devsecops
#
infosec
7
 reactions
Comments
3
 comments
4 min read
Simulating a Phishing Attack Against Your Company
Joe Mainwaring
Joe Mainwaring
Joe Mainwaring
Follow
Mar 30 '22
Simulating a Phishing Attack Against Your Company
#
infosec
#
security
5
 reactions
Comments
Add Comment
3 min read
From Software Developer to Ethical Hacker
whatminjacodes [she/they]
whatminjacodes [she/they]
whatminjacodes [she/they]
Follow
Mar 29 '22
From Software Developer to Ethical Hacker
#
career
#
security
#
womenintech
#
infosec
11
 reactions
Comments
Add Comment
3 min read
Where all DEVs fail in Security
Theodoros Danos
Theodoros Danos
Theodoros Danos
Follow
Mar 28 '22
Where all DEVs fail in Security
#
infosec
#
webdev
#
programming
#
backend
6
 reactions
Comments
Add Comment
2 min read
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More
Deepfence
Deepfence
Deepfence
Follow
Mar 15 '22
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More
#
sbom
#
devsecops
#
infosec
#
appsec
7
 reactions
Comments
Add Comment
5 min read
Reconmap 1.1.0 release notes
Santiago L
Santiago L
Santiago L
Follow
for
Reconmap
Mar 4 '22
Reconmap 1.1.0 release notes
#
vulnerability
#
pentesting
#
infosec
#
opensource
5
 reactions
Comments
Add Comment
2 min read
I did a few things at STM CTF 2018 Prelims
Ata Kuyumcu
Ata Kuyumcu
Ata Kuyumcu
Follow
Jan 17 '22
I did a few things at STM CTF 2018 Prelims
#
ctf
#
python
#
infosec
6
 reactions
Comments
Add Comment
6 min read
Horrifying Vulnerabilities in the Death/Birth Certificate System
Derek Ardolf
Derek Ardolf
Derek Ardolf
Follow
Nov 23 '21
Horrifying Vulnerabilities in the Death/Birth Certificate System
#
security
#
infosec
#
defcon
#
cybersecurity
4
 reactions
Comments
Add Comment
2 min read
A Checklist to Quickly Evaluate SaaS Security
Patrick Walsh
Patrick Walsh
Patrick Walsh
Follow
Sep 27 '21
A Checklist to Quickly Evaluate SaaS Security
#
saas
#
security
#
infosec
#
evaluation
3
 reactions
Comments
Add Comment
4 min read
How to Fix Clickjacking on NGINX Server in 6 Simple Stepsđ„
Keshav Malik
Keshav Malik
Keshav Malik
Follow
Sep 26 '21
How to Fix Clickjacking on NGINX Server in 6 Simple Stepsđ„
#
development
#
infosec
#
nginx
#
clickjacking
8
 reactions
Comments
2
 comments
2 min read
How to list Azure VM potentially affected by the OMI RCE
Olivier Miossec
Olivier Miossec
Olivier Miossec
Follow
Sep 17 '21
How to list Azure VM potentially affected by the OMI RCE
#
azure
#
infosec
#
security
#
omi
4
 reactions
Comments
1
 comment
1 min read
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 16 '21
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple
#
infosec
#
security
#
azure
#
cloud
6
 reactions
Comments
Add Comment
4 min read
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 9 '21
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas
#
security
#
infosec
#
azure
#
serverless
8
 reactions
Comments
Add Comment
3 min read
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 8 '21
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021
#
infosec
#
security
#
azure
#
serverless
7
 reactions
Comments
Add Comment
3 min read
TryHackMe Super-Spam Walkthrough
Krishna
Krishna
Krishna
Follow
Aug 10 '21
TryHackMe Super-Spam Walkthrough
#
infosec
#
ctf
#
tryhackme
#
security
6
 reactions
Comments
Add Comment
14 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account