DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
GHSA-38CW-85XC-XR9X: Identity Crisis: Dumping Veramo's Digital Wallets via SQL Injection

GHSA-38CW-85XC-XR9X: Identity Crisis: Dumping Veramo's Digital Wallets via SQL Injection

Comments
2 min read
CVE-2026-23735: Singleton Roulette: Racing for Context in GraphQL Modules

CVE-2026-23735: Singleton Roulette: Racing for Context in GraphQL Modules

Comments
2 min read
Your Java Regex Can Be Weaponized (And How To Stop It)

Your Java Regex Can Be Weaponized (And How To Stop It)

1
Comments
3 min read
Your Java Regex Can Be Weaponized (And How To Stop It)

Your Java Regex Can Be Weaponized (And How To Stop It)

Comments
3 min read
GHSA-GW32-9RMW-QWWW: Svelte SSR XSS: The Textarea Trap

GHSA-GW32-9RMW-QWWW: Svelte SSR XSS: The Textarea Trap

Comments
2 min read
GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

Comments
2 min read
Uqda Network vs Regular Internet: A Real-World Comparison 📊

Uqda Network vs Regular Internet: A Real-World Comparison 📊

1
Comments
7 min read
Uqda Network: Building a Private Internet Where Privacy is the Default 🌐🔒

Uqda Network: Building a Private Internet Where Privacy is the Default 🌐🔒

1
Comments
8 min read
CVE-2025-8217: Amazon Q's Self-Sabotage: The Backdoor That Couldn't Code

CVE-2025-8217: Amazon Q's Self-Sabotage: The Backdoor That Couldn't Code

Comments
2 min read
CVE-2026-23745: Tar-pit of Doom: Escaping the Root in node-tar

CVE-2026-23745: Tar-pit of Doom: Escaping the Root in node-tar

Comments 1
2 min read
CVE-2026-23535: Trust Issues: Arbitrary File Write in Weblate CLI (CVE-2026-23535)

CVE-2026-23535: Trust Issues: Arbitrary File Write in Weblate CLI (CVE-2026-23535)

Comments
2 min read
How to Use Uqda Network: A Complete Step-by-Step Guide 🚀

How to Use Uqda Network: A Complete Step-by-Step Guide 🚀

1
Comments
9 min read
CVE-2026-23527: Case Sensitivity Kills: HTTP Request Smuggling in H3

CVE-2026-23527: Case Sensitivity Kills: HTTP Request Smuggling in H3

Comments
2 min read
Metasploit Deep Dive: Staged vs. Stageless Payloads — A Practical Lab

Metasploit Deep Dive: Staged vs. Stageless Payloads — A Practical Lab

Comments
3 min read
GHSA-58Q2-9X27-H2JM: The Infinite Buffer: Crashing Craft CMS via Axios Data URIs

GHSA-58Q2-9X27-H2JM: The Infinite Buffer: Crashing Craft CMS via Axios Data URIs

Comments
2 min read
CVE-2026-1002: Ghost in the Machine: Vert.x Cache Poisoning DoS

CVE-2026-1002: Ghost in the Machine: Vert.x Cache Poisoning DoS

Comments
2 min read
Uqda Network: How It Works in Simple Terms 🎯

Uqda Network: How It Works in Simple Terms 🎯

1
Comments
6 min read
CVE-2026-22775: Devalue, Indeed: How a Simple Serializer Can Crash Your Svelte App

CVE-2026-22775: Devalue, Indeed: How a Simple Serializer Can Crash Your Svelte App

Comments
2 min read
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
How a Small Engineering Team Secured Their Self-Hosted Stack with SafeLine WAF

How a Small Engineering Team Secured Their Self-Hosted Stack with SafeLine WAF

Comments
3 min read
Your AI Agent Has Too Much Power: Understanding and Taming Excessive Agency

Your AI Agent Has Too Much Power: Understanding and Taming Excessive Agency

Comments
5 min read
CVE-2026-23519: Betrayal by Optimization: How LLVM Broke Rust's Constant-Time Promises

CVE-2026-23519: Betrayal by Optimization: How LLVM Broke Rust's Constant-Time Promises

Comments
2 min read
The Kiro Agentic IDE Vulnerability (CVE-2026-0830)

The Kiro Agentic IDE Vulnerability (CVE-2026-0830)

Comments
4 min read
CVE-2025-66292: DPanel's Delete Function Works Too Well: A Tale of Path Traversal

CVE-2025-66292: DPanel's Delete Function Works Too Well: A Tale of Path Traversal

Comments
2 min read
Building Web-Based Nmap Tools: Introducing nmap-exec-api

Building Web-Based Nmap Tools: Introducing nmap-exec-api

5
Comments
3 min read
loading...