DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2025-33042: Schema to Shell: Unpacking the Apache Avro Code Injection Vulnerability

CVE-2025-33042: Schema to Shell: Unpacking the Apache Avro Code Injection Vulnerability

Comments
2 min read
Day 1 — Back to Scratch: Relearning Python Without Autopilot

Day 1 — Back to Scratch: Relearning Python Without Autopilot

1
Comments
2 min read
CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

Comments
2 min read
Implementing BLE Security on ESP32: LE Secure Connections the Hard Way

Implementing BLE Security on ESP32: LE Secure Connections the Hard Way

Comments
5 min read
Prompt Injection Is the “Social Engineering” of AI Apps

Prompt Injection Is the “Social Engineering” of AI Apps

1
Comments 1
2 min read
Security Theater vs Structural Protection

Security Theater vs Structural Protection

Comments
3 min read
Vens: Stop Patching Vulnerabilities That Don't Matter to You

Vens: Stop Patching Vulnerabilities That Don't Matter to You

Comments 1
2 min read
🔍 Beginner’s Guide to Nmap: Understanding Network Scanning for Cybersecurity

🔍 Beginner’s Guide to Nmap: Understanding Network Scanning for Cybersecurity

Comments
2 min read
GHSA-8WC6-VGRQ-X6CF: Renovate's TMI: When Automation Leaks the Keys to the Kingdom

GHSA-8WC6-VGRQ-X6CF: Renovate's TMI: When Automation Leaks the Keys to the Kingdom

Comments
2 min read
How to Enable MAC Address Randomisation in Linux Desktop

How to Enable MAC Address Randomisation in Linux Desktop

Comments
2 min read
GHSA-7587-4WV6-M68M: Panic at the Keyring: Crashing rPGP with a Single Byte

GHSA-7587-4WV6-M68M: Panic at the Keyring: Crashing rPGP with a Single Byte

Comments
2 min read
CVE-2026-26187: CVE-2026-26187: escaping the Lake with a Path Traversal Two-Step

CVE-2026-26187: CVE-2026-26187: escaping the Lake with a Path Traversal Two-Step

Comments
2 min read
Why Obfuscation Alone Does NOT Secure Your Mobile App

Why Obfuscation Alone Does NOT Secure Your Mobile App

Comments
2 min read
The OWASP Top 10 for LLMs — A Pentester's Practical Guide

The OWASP Top 10 for LLMs — A Pentester's Practical Guide

Comments
12 min read
I Built an Experimental Async OSINT Tool in Python (VoidScan)

I Built an Experimental Async OSINT Tool in Python (VoidScan)

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.