I built a log analyzer, and it found real attacks on my own machine
I am documenting every day of my cybersecurity learning journey publicly. This post covers Days 8 through 12 — the first half of Week 2. The most significant thing I built this week is a Python log analyzer. It reads Linux auth.log files, finds every failed SSH login attempt, extracts the source IP
ORIGINAL SOURCE →via Dev.to
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] GHSA-9J88-VVJ5-VHGR: GHSA-9j88-vvj5-vhgr: STARTTLS Response Injection and SASL Downgrade in MailKit
- [CYBER] Apple account change alerts abused to send phishing emails
- [CYBER] Vercel Says Internal Systems Hit in Breach
- [CYBER] Vercel Says Internal Systems Hit in Breach
- [CYBER] Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025
- [CYBER] Found and reported a Second-Order SQL Injection in mailcow (CVE-2026-40871) – High severity