Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Analyzing Akamai BMP 4.1.3 - Part 2
xVE
xVE
xVE
Follow
Mar 24
Analyzing Akamai BMP 4.1.3 - Part 2
#
cybersecurity
#
infosec
#
programming
#
security
Comments
Add Comment
12 min read
Hello Dev Community! I'm Thai Duong (TD.Shield) – Data Security & Zero Trust Advocate 🛡️
Thái Dương Sec
Thái Dương Sec
Thái Dương Sec
Follow
Mar 24
Hello Dev Community! I'm Thai Duong (TD.Shield) – Data Security & Zero Trust Advocate 🛡️
#
career
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
2 min read
PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution
BeyondMachines
BeyondMachines
BeyondMachines
Follow
for
BeyondMachines
Mar 22
PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution
#
cybersecurity
#
infosec
1
 reaction
Comments
Add Comment
1 min read
AI Chatbot Hack: Two‑Hour Breach Rewrites Security
Simon Paxton
Simon Paxton
Simon Paxton
Follow
Mar 23
AI Chatbot Hack: Two‑Hour Breach Rewrites Security
#
mckinsey
#
cybersecurity
#
databreach
#
infosec
Comments
Add Comment
7 min read
AI Agent Hack: Prompt‑Layer Security Is the Real Threat
Simon Paxton
Simon Paxton
Simon Paxton
Follow
Mar 22
AI Agent Hack: Prompt‑Layer Security Is the Real Threat
#
cybersecurity
#
infosec
#
promptengineering
#
datasecurity
Comments
Add Comment
7 min read
Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️
Devon Argent
Devon Argent
Devon Argent
Follow
Mar 22
Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️
#
cybersecurity
#
infosec
#
networking
#
tutorial
Comments
Add Comment
1 min read
Day 26: The Pentester's Playbook — Strategy, Keys, and Smart Pivoting 🕵️‍♂️
Devon Argent
Devon Argent
Devon Argent
Follow
Mar 20
Day 26: The Pentester's Playbook — Strategy, Keys, and Smart Pivoting 🕵️‍♂️
#
cybersecurity
#
infosec
#
linux
#
security
Comments
Add Comment
2 min read
#tag:-A Simple Recon Workflow for Beginner Bug Hunters
kato junior
kato junior
kato junior
Follow
Mar 20
#tag:-A Simple Recon Workflow for Beginner Bug Hunters
#
beginners
#
infosec
#
security
#
tutorial
Comments
Add Comment
1 min read
The 2026 Frontier: Why Tunneling is Now a Compliance Problem
InstaTunnel
InstaTunnel
InstaTunnel
Follow
Mar 22
The 2026 Frontier: Why Tunneling is Now a Compliance Problem
#
cybersecurity
#
infosec
#
networking
#
security
Comments
Add Comment
9 min read
#tag:-Understanding Reconnaissance in Bug Bounty Hunting
kato junior
kato junior
kato junior
Follow
Mar 16
#tag:-Understanding Reconnaissance in Bug Bounty Hunting
#
beginners
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
1 min read
#tag:-Common Vulnerabilities Beginners Should Learn in Bug Bounty
kato junior
kato junior
kato junior
Follow
Mar 16
#tag:-Common Vulnerabilities Beginners Should Learn in Bug Bounty
#
beginners
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
1 min read
Update: pecheck.py Version 0.7.20
Mark0
Mark0
Mark0
Follow
Mar 13
Update: pecheck.py Version 0.7.20
#
cybersecurity
#
infosec
#
malware
#
tools
1
 reaction
Comments
Add Comment
1 min read
Day 20: SUID Deep-Dive — From Zip to Tar Exploitation 🕵️‍♂️
Devon Argent
Devon Argent
Devon Argent
Follow
Mar 14
Day 20: SUID Deep-Dive — From Zip to Tar Exploitation 🕵️‍♂️
#
infosec
#
linux
#
security
#
tutorial
1
 reaction
Comments
Add Comment
1 min read
I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing
Yoel Frischoff
Yoel Frischoff
Yoel Frischoff
Follow
Mar 16
I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing
#
showdev
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
2 min read
Why Your Nginx Security Headers Disappear (add_header Inheritance Explained)
gokcedemirdurkut
gokcedemirdurkut
gokcedemirdurkut
Follow
Mar 12
Why Your Nginx Security Headers Disappear (add_header Inheritance Explained)
#
backend
#
devops
#
infosec
#
security
1
 reaction
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account