DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
From Blueprints to Battlegrounds: My Experience as a Cybersecurity Intern at Anonymous India

From Blueprints to Battlegrounds: My Experience as a Cybersecurity Intern at Anonymous India

Comments
2 min read
Common SOC 2 Failures (Real World)

Common SOC 2 Failures (Real World)

Comments
3 min read
I Built an Offline Threat-Hunting CLI in Python — Here's How ThreatLens Catches Real Attacks

I Built an Offline Threat-Hunting CLI in Python — Here's How ThreatLens Catches Real Attacks

1
Comments
3 min read
The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside

The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside

Comments
7 min read
n8n Webhook Abuse: How Legitimate Automation Tools Are Being Turned Into Cyber Weapons

n8n Webhook Abuse: How Legitimate Automation Tools Are Being Turned Into Cyber Weapons

Comments
3 min read
Cyblack internship Ethical hacking sprint write-up

Cyblack internship Ethical hacking sprint write-up

Comments
3 min read
Deepfake Audio Attacks: A New Frontier in Social Engineering

Deepfake Audio Attacks: A New Frontier in Social Engineering

Comments
10 min read
Kerberoasting Still Works Because You Trust AES Too Much

Kerberoasting Still Works Because You Trust AES Too Much

Comments
7 min read
Malware-Based Attacks: The Undying Threat of the Computer Virus

Malware-Based Attacks: The Undying Threat of the Computer Virus

Comments
5 min read
SOC 2 End-to-End Guide (Big 4 Style)

SOC 2 End-to-End Guide (Big 4 Style)

Comments
3 min read
Anyone interested in a free cybersecurity conference + CTF in Korea this July?

Anyone interested in a free cybersecurity conference + CTF in Korea this July?

Comments
1 min read
Week 7

Week 7

Comments
2 min read
Week 6

Week 6

Comments
2 min read
The Power of Prediction: Machine Learning for Ransomware Prevention

The Power of Prediction: Machine Learning for Ransomware Prevention

Comments
2 min read
Beyond End-to-End Encryption: How the FBI Recovered "Deleted" Signal Messages

Beyond End-to-End Encryption: How the FBI Recovered "Deleted" Signal Messages

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.