DEV Community

Ksenia Rudneva profile picture

Ksenia Rudneva

I hunt for vulnerabilities and explore how attacks really work. Expect deep dives into protocols, packet‑level mysteries, and surprising weak spots in everyday systems.

Joined Joined on 
Microsoft's Software Ecosystem Faces 79 Vulnerabilities: Urgent Patching and Mitigation Strategies Required

Microsoft's Software Ecosystem Faces 79 Vulnerabilities: Urgent Patching and Mitigation Strategies Required

Comments
16 min read
Drywall Foreman in Ontario Demands $35/Hour Wage Review: Is the Pay Fair for the Responsibilities and Workload?

Drywall Foreman in Ontario Demands $35/Hour Wage Review: Is the Pay Fair for the Responsibilities and Workload?

Comments
13 min read
Pac4j-JWT Authentication Bypass Vulnerability Undetected for Six Years Despite Advanced Security Tools

Pac4j-JWT Authentication Bypass Vulnerability Undetected for Six Years Despite Advanced Security Tools

Comments
9 min read
Basic Operator Exploits Weak FortiGate Passwords in 55 Countries Using AI, Compromising 600+ Devices Without Zero-Days.

Basic Operator Exploits Weak FortiGate Passwords in 55 Countries Using AI, Compromising 600+ Devices Without Zero-Days.

Comments
12 min read
Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites

Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites

Comments
8 min read
Post-Quantum TLS Signatures Increase Handshake Size: Solutions to Mitigate Performance and Compatibility Issues

Post-Quantum TLS Signatures Increase Handshake Size: Solutions to Mitigate Performance and Compatibility Issues

Comments
13 min read
Navigating Legal and Compliance Challenges in Tech Content Aggregation: Balancing Data Privacy, IP Rights, and Liability Risks

Navigating Legal and Compliance Challenges in Tech Content Aggregation: Balancing Data Privacy, IP Rights, and Liability Risks

Comments
8 min read
loading...