DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
DOMINI Suite: how I built two OSINT tools to analyze domains and IPs from scratch

DOMINI Suite: how I built two OSINT tools to analyze domains and IPs from scratch

Comments
3 min read
Cybersecurity Foundations: Building a Cohesive Strategy from Interlocking Principles

Cybersecurity Foundations: Building a Cohesive Strategy from Interlocking Principles

Comments
4 min read
Cybersecurity Foundations: Secure by Design — Shifting from Firefighting to Proactive Architecture

Cybersecurity Foundations: Secure by Design — Shifting from Firefighting to Proactive Architecture

Comments
4 min read
CyberKB: Cómo construí una base de conocimiento de ciberseguridad con IA y Claude Sonnet — mi proyecto en Evolve

CyberKB: Cómo construí una base de conocimiento de ciberseguridad con IA y Claude Sonnet — mi proyecto en Evolve

Comments
3 min read
Subpoena-Proofing by Design: Why Real Zero-Knowledge Has No Back Door

Subpoena-Proofing by Design: Why Real Zero-Knowledge Has No Back Door

Comments
7 min read
The Illusion of Invisibility: The Truth About Security Through Obscurity

The Illusion of Invisibility: The Truth About Security Through Obscurity

Comments
3 min read
Building the Vault First: The Power of "Secure by Design"

Building the Vault First: The Power of "Secure by Design"

Comments
4 min read
The $200K Morse Code Heist: How One Tweet Drained Grok's Crypto Wallet (And How to Stop It)

The $200K Morse Code Heist: How One Tweet Drained Grok's Crypto Wallet (And How to Stop It)

1
Comments
5 min read
How to secure your macOS games

How to secure your macOS games

Comments
5 min read
The Cyber Symphony: Synthesizing a Cohesive Security Strategy

The Cyber Symphony: Synthesizing a Cohesive Security Strategy

Comments
4 min read
CĂłmo construimos un SOC con honeypot e IA local

CĂłmo construimos un SOC con honeypot e IA local

Comments
3 min read
What Is YubiKey Authentication & How It Works

What Is YubiKey Authentication & How It Works

Comments
10 min read
OWASP Top 10 | notes may 11 2026

OWASP Top 10 | notes may 11 2026

Comments
4 min read
Microsoft Turns to Modern Print

Microsoft Turns to Modern Print

1
Comments
6 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access

The Accidental C2 - Exploring Dev Tunnels for Remote Access

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.