DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I built a port scanner from scratch, and it taught me more than running Nmap ever did

I built a port scanner from scratch, and it taught me more than running Nmap ever did

Comments
4 min read
LLM API Security: What Most Teams Don't Test Before Shipping

LLM API Security: What Most Teams Don't Test Before Shipping

1
Comments
4 min read
AI Cyber Capabilities Cross the 32-Step Attack Line

AI Cyber Capabilities Cross the 32-Step Attack Line

Comments
6 min read
Coinbase AI Agent Prompt Injection, Dolibarr RCE, & WordPress Supply Chain Backdoors

Coinbase AI Agent Prompt Injection, Dolibarr RCE, & WordPress Supply Chain Backdoors

Comments
3 min read
Anyone interested in a free cybersecurity conference + CTF in Korea this July?

Anyone interested in a free cybersecurity conference + CTF in Korea this July?

Comments
1 min read
5 Brutal Lessons I Learned After Failing My First OSCP Attempt

5 Brutal Lessons I Learned After Failing My First OSCP Attempt

Comments
2 min read
I Built a Portable SIEM Toolkit That Runs Sigma Rules Without Deploying a Full SIEM

I Built a Portable SIEM Toolkit That Runs Sigma Rules Without Deploying a Full SIEM

Comments
3 min read
How I Built an Automated Linux Hardening Script as a Complete Beginner

How I Built an Automated Linux Hardening Script as a Complete Beginner

Comments
7 min read
All It Took Was npm install (Axios Attack)

All It Took Was npm install (Axios Attack)

1
Comments
4 min read
Sherlock for Digital Forensics & Reconnaissance (OSINT Guide)

Sherlock for Digital Forensics & Reconnaissance (OSINT Guide)

Comments
1 min read
Building Secure AI Systems from Design to Deployment

Building Secure AI Systems from Design to Deployment

1
Comments 1
2 min read
Cross-Site Scripting (XSS) Prevention

Cross-Site Scripting (XSS) Prevention

Comments
1 min read
Three Months with SafeLine WAF: Why It Claims “No Rules Needed” for Injection Defense

Three Months with SafeLine WAF: Why It Claims “No Rules Needed” for Injection Defense

Comments
3 min read
The 8 CISSP Security Domains You Probably Don’t Think About — But Should

The 8 CISSP Security Domains You Probably Don’t Think About — But Should

Comments
4 min read
Week 7

Week 7

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.