DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Advanced Cybersecurity: How Attackers Break In and How to Stop Them

Advanced Cybersecurity: How Attackers Break In and How to Stop Them

Comments
12 min read
SQL Injection – with filter bypass via XML encoding | PortSwigger Lab Note #11

SQL Injection – with filter bypass via XML encoding | PortSwigger Lab Note #11

Comments
2 min read
Kernel-Level Anti-Cheat: How Ring 0 Drivers Actually Work and Why Gamers Are Right to Be Nervous

Kernel-Level Anti-Cheat: How Ring 0 Drivers Actually Work and Why Gamers Are Right to Be Nervous

Comments
7 min read
Building Argus: A Voice-Driven SOC Copilot with Gemini Live

Building Argus: A Voice-Driven SOC Copilot with Gemini Live

2
Comments
3 min read
Day 21: PATH Hijacking & Cron Exploitation — The Automation Trap 🕵️‍♂️

Day 21: PATH Hijacking & Cron Exploitation — The Automation Trap 🕵️‍♂️

Comments
1 min read
Snakebite v2.0: The All-in-One Vulnerability Scanner for Modern Security Testing

Snakebite v2.0: The All-in-One Vulnerability Scanner for Modern Security Testing

Comments
2 min read
Cross-site scripting – Reflected XSS | PortSwigger Lab Note #3

Cross-site scripting – Reflected XSS | PortSwigger Lab Note #3

6
Comments
2 min read
NSA's APT Classification Omission: Questioning Criteria and Motivations Behind Threat Categorizations

NSA's APT Classification Omission: Questioning Criteria and Motivations Behind Threat Categorizations

Comments
6 min read
Building ResilAI: An AI Incident Readiness Platform with Gemini and Google Cloud

Building ResilAI: An AI Incident Readiness Platform with Gemini and Google Cloud

3
Comments
2 min read
#tag:-Common Vulnerabilities Beginners Should Learn in Bug Bounty

#tag:-Common Vulnerabilities Beginners Should Learn in Bug Bounty

Comments
1 min read
CrewAI Exfiltrated Data 65% of the Time. Where Is the Authentication Layer?

CrewAI Exfiltrated Data 65% of the Time. Where Is the Authentication Layer?

1
Comments
2 min read
9 Real MCP Security Breaches: CVEs, Data Leaks, and Why the Protocol Needs a Cryptographic Identity Layer

9 Real MCP Security Breaches: CVEs, Data Leaks, and Why the Protocol Needs a Cryptographic Identity Layer

1
Comments
4 min read
Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems

Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems

1
Comments
2 min read
Five Chrome Zero-Days in Two Weeks: The Most Aggressive Browser Attack Wave of 2024

Five Chrome Zero-Days in Two Weeks: The Most Aggressive Browser Attack Wave of 2024

1
Comments
6 min read
Essential Cybersecurity Practices Every Developer Should Know

Essential Cybersecurity Practices Every Developer Should Know

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.