DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CiberIA Auditor: Technical Simulation of an AI Security Assessment

CiberIA Auditor: Technical Simulation of an AI Security Assessment

Comments
3 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Comments
1 min read
ZoomEye vs. Other Search Engines: Why It’s the Top Choice for Security Researchers

ZoomEye vs. Other Search Engines: Why It’s the Top Choice for Security Researchers

1
Comments
2 min read
🌐 OSI Model vs TCP/IP Model: Beginner-Friendly Guide

🌐 OSI Model vs TCP/IP Model: Beginner-Friendly Guide

1
Comments 1
2 min read
WinRAR 0-Day Exploit

WinRAR 0-Day Exploit

Comments
3 min read
Como uma Ligação Falsa do Suporte Google e 2FA Sincronizado na Nuvem Custou US$130.000 a um Desenvolvedor

Como uma Ligação Falsa do Suporte Google e 2FA Sincronizado na Nuvem Custou US$130.000 a um Desenvolvedor

Comments
2 min read
Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

1
Comments
12 min read
Kubernetes Security: Best Practices to Protect Your Cluster

Kubernetes Security: Best Practices to Protect Your Cluster

11
Comments
17 min read
Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

1
Comments
4 min read
Puzzles for Hacker (task only)

Puzzles for Hacker (task only)

Comments
6 min read
New CiberIA Sandbox with AIsecTest Now Available for Criterion-Based AI Response Evaluation

New CiberIA Sandbox with AIsecTest Now Available for Criterion-Based AI Response Evaluation

Comments
1 min read
API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

2
Comments
3 min read
Top 5 Technical Asset Discovery Tools in OSINT

Top 5 Technical Asset Discovery Tools in OSINT

Comments
3 min read
Here's what ISO 27001 Is - and Why You Should Care About Your Data Security

Here's what ISO 27001 Is - and Why You Should Care About Your Data Security

Comments
4 min read
Security in CI/CD Pipelines

Security in CI/CD Pipelines

Comments
10 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.