DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Secure AI Agent Harness for a Bank: From Architecture to Working Code

Building a Secure AI Agent Harness for a Bank: From Architecture to Working Code

Comments
15 min read
How We Catch the Axios DPRK RAT — Directly in Your IDE

How We Catch the Axios DPRK RAT — Directly in Your IDE

Comments
3 min read
Securing AI Agents in a Bank: From Daily ChatGPT Use to a Production-Ready Secure Harness

Securing AI Agents in a Bank: From Daily ChatGPT Use to a Production-Ready Secure Harness

Comments
18 min read
De CSRF a RCE: una visita web cuesta una shell en OpenYak

De CSRF a RCE: una visita web cuesta una shell en OpenYak

Comments
9 min read
Microsoft Defender Zero-Days, GitHub Supply Chain Breaches, and Python Package Compromises

Microsoft Defender Zero-Days, GitHub Supply Chain Breaches, and Python Package Compromises

Comments
3 min read
The Growing Importance of Cybersecurity in AWS Cloud Environments

The Growing Importance of Cybersecurity in AWS Cloud Environments

Comments
2 min read
Hybrid Warfare Never Stopped. Most People Just Stopped Recognizing It.

Hybrid Warfare Never Stopped. Most People Just Stopped Recognizing It.

Comments
7 min read
DPRK Hacking Trends 2026: AI‑Powered Supply Chain and Developer Environment Attacks

DPRK Hacking Trends 2026: AI‑Powered Supply Chain and Developer Environment Attacks

1
Comments
4 min read
What AI Training Taught Me About Clear Technical Thinking — And Why It Matters in Cybersecurity

What AI Training Taught Me About Clear Technical Thinking — And Why It Matters in Cybersecurity

Comments
2 min read
🚀 Replicating the evasive VoidLink: My Journey Building Cortex C2

🚀 Replicating the evasive VoidLink: My Journey Building Cortex C2

Comments
3 min read
Your Promo Budget Is Funding Fraud — 6 Ways Fraudsters Drain Your Campaigns

Your Promo Budget Is Funding Fraud — 6 Ways Fraudsters Drain Your Campaigns

Comments
4 min read
When DNS TXT Records Become a Backdoor: Lessons from a Go Supply Chain Attack

When DNS TXT Records Become a Backdoor: Lessons from a Go Supply Chain Attack

Comments
7 min read
Recovering: Learning progress Pt.15

Recovering: Learning progress Pt.15

Comments
1 min read
YellowKey: How One Anonymous Researcher Broke Enterprise BitLocker

YellowKey: How One Anonymous Researcher Broke Enterprise BitLocker

Comments
5 min read
Week 9

Week 9

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.