DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SeeTheSharpFlag — Hack The Box Mobile Challenge Write-up

SeeTheSharpFlag — Hack The Box Mobile Challenge Write-up

Comments
2 min read
GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

Comments
2 min read
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

Comments
6 min read
Fortifying Web Applications: Understanding CSRF (Cross-Site Request Forgery)

Fortifying Web Applications: Understanding CSRF (Cross-Site Request Forgery)

1
Comments
2 min read
Safeinstall: Um aliado no combate a ataques de Supply chain

Safeinstall: Um aliado no combate a ataques de Supply chain

1
Comments
6 min read
GHSA-33HQ-FVWR-56PM: The Billion-Comma Attack: Nuking Svelte SSR with Sparse Arrays

GHSA-33HQ-FVWR-56PM: The Billion-Comma Attack: Nuking Svelte SSR with Sparse Arrays

Comments
2 min read
GHSA-6C9J-X93C-RW6J: OpenClaw Side-Channel: The `safeBins` File Existence Oracle

GHSA-6C9J-X93C-RW6J: OpenClaw Side-Channel: The `safeBins` File Existence Oracle

Comments
2 min read
Week 6 OAuth2 Conceptual Quiz

Week 6 OAuth2 Conceptual Quiz

1
Comments
10 min read
CVE-2026-1669: Model Poisoning: Turning Keras Weights into Weaponized File Readers

CVE-2026-1669: Model Poisoning: Turning Keras Weights into Weaponized File Readers

Comments
2 min read
GHSA-VRHM-GVG7-FPCF: SvelteKit Remote Functions: Death by Type Coercion

GHSA-VRHM-GVG7-FPCF: SvelteKit Remote Functions: Death by Type Coercion

Comments
2 min read
How Supply Chain Attacks Work

How Supply Chain Attacks Work

1
Comments
5 min read
Dell RecoverPoint CVE-2026-22769: UNC6201 Attack Chain Analysis

Dell RecoverPoint CVE-2026-22769: UNC6201 Attack Chain Analysis

Comments
5 min read
GHSA-RWJ8-P9VQ-25GV: OpenClaw BlueBubbles: When Your iMessage Bridge Becomes a Spy

GHSA-RWJ8-P9VQ-25GV: OpenClaw BlueBubbles: When Your iMessage Bridge Becomes a Spy

Comments
2 min read
GHSA-9PPG-JX86-FQW7: Clinejection: When AI Agents Go Rogue and Poison Your Supply Chain

GHSA-9PPG-JX86-FQW7: Clinejection: When AI Agents Go Rogue and Poison Your Supply Chain

Comments
2 min read
I scanned 5000 random Jupyter Notebooks from GitHub. Here’s the "Graveyard" of secrets I found.

I scanned 5000 random Jupyter Notebooks from GitHub. Here’s the "Graveyard" of secrets I found.

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.