DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Brain.A turns 40 🥳 - A Bedtime Story

Brain.A turns 40 🥳 - A Bedtime Story

15
Comments 1
4 min read
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

6
Comments 2
13 min read
🔥 Building Vigilo: A 15MB File Integrity Monitor That Outperforms OSSEC

🔥 Building Vigilo: A 15MB File Integrity Monitor That Outperforms OSSEC

1
Comments 2
2 min read
Sophiax —Detección de Intención: El fin de los ataques Evil Twin y el Ransomware mediante Blindaje Híbrido

Sophiax —Detección de Intención: El fin de los ataques Evil Twin y el Ransomware mediante Blindaje Híbrido

1
Comments
4 min read
3 Prompt Injection Attacks You Can Test Right Now

3 Prompt Injection Attacks You Can Test Right Now

5
Comments
5 min read
BugBoard: A Centralized Dashboard for Bug Bounty Hunters & Security Researchers

BugBoard: A Centralized Dashboard for Bug Bounty Hunters & Security Researchers

Comments
3 min read
I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

1
Comments
4 min read
"Khoor Zruog!", Caesar says.

"Khoor Zruog!", Caesar says.

Comments
4 min read
🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38

🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38

18
Comments
11 min read
Prompt Injection Is the “Social Engineering” of AI Apps

Prompt Injection Is the “Social Engineering” of AI Apps

1
Comments 1
2 min read
CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

Comments
2 min read
Remote Hiring in 2026: What Founders Still Get Wrong About Identity Fraud

Remote Hiring in 2026: What Founders Still Get Wrong About Identity Fraud

27
Comments 4
3 min read
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

7
Comments 5
4 min read
CVE-2026-23954: Incus Escape: From Templates to Host Root

CVE-2026-23954: Incus Escape: From Templates to Host Root

Comments
2 min read
CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.