DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Hackers Exploit RDP (Port 3389) — Real Attack Breakdown & Prevention Guide

How Hackers Exploit RDP (Port 3389) — Real Attack Breakdown & Prevention Guide

Comments
2 min read
Why API Security Is the Most Valuable Skill You’re Not Learning

Why API Security Is the Most Valuable Skill You’re Not Learning

Comments
6 min read
Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed

Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed

Comments
12 min read
The litellm supply chain attack: how MCP servers got compromised and how to check if you're affected

The litellm supply chain attack: how MCP servers got compromised and how to check if you're affected

Comments
4 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
GHSA-5VP3-3CG6-2RQ3: GHSA-5VP3-3CG6-2RQ3: Cross-Site Scripting via Markdown Serialization Breakout in justhtml

GHSA-5VP3-3CG6-2RQ3: GHSA-5VP3-3CG6-2RQ3: Cross-Site Scripting via Markdown Serialization Breakout in justhtml

Comments
2 min read
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows

Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows

Comments
3 min read
Find Plaintext Secrets Hiding in Your .env Files

Find Plaintext Secrets Hiding in Your .env Files

Comments
4 min read
🚀 I Built an AI Powered Cybersecurity Assistant – CyberScan AI (Now Live)

🚀 I Built an AI Powered Cybersecurity Assistant – CyberScan AI (Now Live)

Comments
1 min read
Eradication in Incident Handling

Eradication in Incident Handling

Comments
2 min read
I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them

I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them

Comments
8 min read
What Is Proof of Authorship? How Cryptographic Timestamps Protect Your Work

What Is Proof of Authorship? How Cryptographic Timestamps Protect Your Work

Comments 1
9 min read
Containment in Incident Handling

Containment in Incident Handling

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.