DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
Your Location History Is for Sale: The $32 Billion Data Broker Industry That Tracks Every Step You Take

Your Location History Is for Sale: The $32 Billion Data Broker Industry That Tracks Every Step You Take

1
Comments
10 min read
OpenClaw Joined OpenAI. Every Security Researcher Should Be Alarmed.

OpenClaw Joined OpenAI. Every Security Researcher Should Be Alarmed.

1
Comments
5 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

Comments
1 min read
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely

Stablize Windows By Fixing BIOS, Chipset, And GPU Safely

1
Comments
6 min read
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

Your API Is Leaking Its Server Version. Yes, That’s Still a Thing

1
Comments 1
1 min read
Why Security is Always Late: Economics, Zero-Days, and Attacker Math

Why Security is Always Late: Economics, Zero-Days, and Attacker Math

1
Comments
4 min read
Why Compliance Automation Platforms Can't Solve the Decision Audit Problem

Why Compliance Automation Platforms Can't Solve the Decision Audit Problem

1
Comments 1
4 min read
The First Full-Scale Cyber War: 4 Years of Lessons

The First Full-Scale Cyber War: 4 Years of Lessons

Comments
7 min read
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

3
Comments
2 min read
The Descent Through the Trust Stack

The Descent Through the Trust Stack

2
Comments
5 min read
Purple Teaming, Or: Why Siloed Teams Fail

Purple Teaming, Or: Why Siloed Teams Fail

1
Comments
5 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.