DEV Community

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

Audit Trails in Web Applications: Why Detailed Logs Are Your Silent Guardian

Comments
3 min read
Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

Industry-Specific Data Security: Protecting Sensitive Data Before It’s Too Late

1
Comments
3 min read
Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

Comments
2 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

5
Comments
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters

Patch Management vs Vulnerability Management: Why the Difference Matters

1
Comments
5 min read
Dealing With Dependency Vulnerabilities

Dealing With Dependency Vulnerabilities

4
Comments
4 min read
Vulnerability Scanner Overview

Vulnerability Scanner Overview

Comments
9 min read
Security Principles

Security Principles

Comments
11 min read
Fundamentals of Intrusion Detection Systems (IDS)

Fundamentals of Intrusion Detection Systems (IDS)

Comments
8 min read
SIEM (Security Information and Event Management system) - overview

SIEM (Security Information and Event Management system) - overview

Comments
9 min read
Siber Güvenlik Refleksi: Apache ve CUPS Üzerinde Sızma Testi Süreci / Cybersecurity Reflex: Penetration Testing on Apache & CUPS

Siber Güvenlik Refleksi: Apache ve CUPS Üzerinde Sızma Testi Süreci / Cybersecurity Reflex: Penetration Testing on Apache & CUPS

Comments
2 min read
Understanding Zero Trust: The Future of Cyber security

Understanding Zero Trust: The Future of Cyber security

3
Comments
3 min read
📞 WhatsApp Missed Call Scam — The Call You Should Never Return

📞 WhatsApp Missed Call Scam — The Call You Should Never Return

3
Comments
4 min read
HTB - Bastion (Windows)

HTB - Bastion (Windows)

1
Comments
1 min read
🔐 Authentication & Authorization: How to Build a Secure User Login System That Your Users Can Trust

🔐 Authentication & Authorization: How to Build a Secure User Login System That Your Users Can Trust

1
Comments
3 min read
A Solid Linux Resource I Keep Coming Back To

A Solid Linux Resource I Keep Coming Back To

Comments
1 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

6
Comments
2 min read
Security Research: Security Vulnerability Investigation

Security Research: Security Vulnerability Investigation

1
Comments
1 min read
Why Security as part of CI/CD Matters (And Where To Start)

Why Security as part of CI/CD Matters (And Where To Start)

Comments
2 min read
DNS: The Hidden Battlefield No One Talks About

DNS: The Hidden Battlefield No One Talks About

1
Comments
2 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

3
Comments
5 min read
Why the Lock Icon in Your Browser Actually Matters: The Role of SSL and TLS

Why the Lock Icon in Your Browser Actually Matters: The Role of SSL and TLS

1
Comments
1 min read
The Octocat Isn’t What It Seems

The Octocat Isn’t What It Seems

Comments
4 min read
SOC (Security Operations Center) Fundamentals: A Beginner’s Guide

SOC (Security Operations Center) Fundamentals: A Beginner’s Guide

1
Comments
8 min read
loading...