DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Day 3 Learning How Data Actually Moves (TCP/IP, TCP vs UDP, DHCP)

Day 3 Learning How Data Actually Moves (TCP/IP, TCP vs UDP, DHCP)

Comments
1 min read
Safely Handling Malware Samples for API Testing

Safely Handling Malware Samples for API Testing

Comments
20 min read
Why Scam Campaigns Should Be Understood from Contact to Loss

Why Scam Campaigns Should Be Understood from Contact to Loss

Comments
6 min read
RF Intelligence: The Attack Surface Your SIEM Can't See

RF Intelligence: The Attack Surface Your SIEM Can't See

Comments
4 min read
Email Spoofing vs AI Messaging: What's Changing in 2026

Email Spoofing vs AI Messaging: What's Changing in 2026

Comments
7 min read
How to Triage a Ransomware Alert Without Losing the First 15 Minutes

How to Triage a Ransomware Alert Without Losing the First 15 Minutes

Comments
5 min read
An AI Agent Hit 600 Firewalls in 55 Countries With No Human

An AI Agent Hit 600 Firewalls in 55 Countries With No Human

Comments
7 min read
fast16 Malware Discovery Shows Cyber Sabotage Was Already Mature Before Stuxnet

fast16 Malware Discovery Shows Cyber Sabotage Was Already Mature Before Stuxnet

Comments
4 min read
🚀 SOC Analyst Journey – Day 2: IP, DNS & Basic Network Commands

🚀 SOC Analyst Journey – Day 2: IP, DNS & Basic Network Commands

Comments
2 min read
Your AI Agent Is Reading Poisoned Web Pages (And You Don't Know It)

Your AI Agent Is Reading Poisoned Web Pages (And You Don't Know It)

1
Comments
4 min read
MP2 RSA-OAEP Authenticated Encryption (Encrypt-then-Sign)

MP2 RSA-OAEP Authenticated Encryption (Encrypt-then-Sign)

Comments
5 min read
Cybersecurity Is Entering Its Most Dangerous Era: When Machines Attack Trust Itself

Cybersecurity Is Entering Its Most Dangerous Era: When Machines Attack Trust Itself

1
Comments
3 min read
The Cryptographic Cliff: Post-Quantum Migration at Scale

The Cryptographic Cliff: Post-Quantum Migration at Scale

Comments
10 min read
Your Encrypted App Has a Leak. It's Called Metadata.

Your Encrypted App Has a Leak. It's Called Metadata.

Comments
4 min read
Codename: TEMPEST — The real magnitude of an 80-year-old threat

Codename: TEMPEST — The real magnitude of an 80-year-old threat

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.