DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
httprecon3: The Ultimate Stealthy Recon Tool for Bug Bounty Hunters and Pentesters

httprecon3: The Ultimate Stealthy Recon Tool for Bug Bounty Hunters and Pentesters

Comments 1
4 min read
Rethinking Security Resilience And Getting Back To Basics At CornCon 11

Rethinking Security Resilience And Getting Back To Basics At CornCon 11

1
Comments
8 min read
SubX: A Fast Subdomain Buster & Full-Site Crawler with Screenshots (Python + Async)

SubX: A Fast Subdomain Buster & Full-Site Crawler with Screenshots (Python + Async)

1
Comments
2 min read
Top 10 Cybersecurity Projects You Can’t Miss in 2026

Top 10 Cybersecurity Projects You Can’t Miss in 2026

5
Comments
4 min read
Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

1
Comments 1
5 min read
LLM Prompt Injection: Risks, Real Attacks, and Enterprise-Grade Defenses

LLM Prompt Injection: Risks, Real Attacks, and Enterprise-Grade Defenses

Comments
7 min read
The Cost of a Cloud Breach for a Mid-Sized Law Firm: Risks & Solutions

The Cost of a Cloud Breach for a Mid-Sized Law Firm: Risks & Solutions

Comments
5 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
The Silent Breach: Why SaaS Security Fails Between Release

The Silent Breach: Why SaaS Security Fails Between Release

3
Comments
2 min read
Secure by Design in the Age of GenAI: How Devs Must Shift Their Software Security Practices in 2025

Secure by Design in the Age of GenAI: How Devs Must Shift Their Software Security Practices in 2025

Comments
3 min read
AI Agents and Vibe Coding: Redefining Digital Identity for Developers

AI Agents and Vibe Coding: Redefining Digital Identity for Developers

Comments
3 min read
How NAT Works: A Simple Guide to Network Address Translation

How NAT Works: A Simple Guide to Network Address Translation

Comments
4 min read
SPF Permerror Solutions: Ensure Your Emails Are Delivered Safely

SPF Permerror Solutions: Ensure Your Emails Are Delivered Safely

Comments
3 min read
How to Secure a Legal AI Chatbot So It Doesn’t Leak Client Data With Easy Steps to Protect Your Law Firm

How to Secure a Legal AI Chatbot So It Doesn’t Leak Client Data With Easy Steps to Protect Your Law Firm

Comments
4 min read
Introducing LinuxCommandHub: Your Free Guide to Linux Mastery

Introducing LinuxCommandHub: Your Free Guide to Linux Mastery

Comments
2 min read
Step-By-Step Guide: Checking Your Domain’s SPF Record Like A Pro

Step-By-Step Guide: Checking Your Domain’s SPF Record Like A Pro

Comments
3 min read
Things You Must Know About Cybersecurity in the Cloud

Things You Must Know About Cybersecurity in the Cloud

4
Comments
5 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

Comments
3 min read
Top 7 Cybersecurity Certifications for Beginners

Top 7 Cybersecurity Certifications for Beginners

Comments
3 min read
Hacked: Input validation in app

Hacked: Input validation in app

Comments
1 min read
VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

2
Comments
11 min read
Part 1: Understanding AWS Identity and Access Management (IAM)

Part 1: Understanding AWS Identity and Access Management (IAM)

Comments
4 min read
DevSecOps: Modelo de madurez y alternativas de implementación

DevSecOps: Modelo de madurez y alternativas de implementación

5
Comments
10 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

3
Comments
8 min read
loading...