close

DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

BERJAYA 1
Comments 1
1 min read
Why Security is Always Late: Economics, Zero-Days, and Attacker Math

Why Security is Always Late: Economics, Zero-Days, and Attacker Math

BERJAYA 1
Comments
4 min read
Why Compliance Automation Platforms Can't Solve the Decision Audit Problem

Why Compliance Automation Platforms Can't Solve the Decision Audit Problem

BERJAYA 1
Comments 1
4 min read
The First Full-Scale Cyber War: 4 Years of Lessons

The First Full-Scale Cyber War: 4 Years of Lessons

Comments
7 min read
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

BERJAYA BERJAYA 3
Comments
2 min read
The Descent Through the Trust Stack

The Descent Through the Trust Stack

BERJAYA 2
Comments
5 min read
Purple Teaming, Or: Why Siloed Teams Fail

Purple Teaming, Or: Why Siloed Teams Fail

BERJAYA 1
Comments
5 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Comments
1 min read
OWASP Cornucopia is publishing it’s darkest secrets!

OWASP Cornucopia is publishing it’s darkest secrets!

BERJAYA BERJAYA BERJAYA 5
Comments 1
5 min read
Persona Matrices for Authentication and Access Control

Persona Matrices for Authentication and Access Control

BERJAYA 1
Comments
3 min read
How Companies Scan Their Own Networks: A Practical Red Team View with Nmap

How Companies Scan Their Own Networks: A Practical Red Team View with Nmap

BERJAYA 2
Comments
2 min read
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

BERJAYA BERJAYA BERJAYA 6
Comments 2
13 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.