DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I spent 4 hours writing a pentest report so I built something to do it in 10 minutes

I spent 4 hours writing a pentest report so I built something to do it in 10 minutes

Comments
1 min read
Ransomware's Real Threat: Not the Ransom, the Extortion

Ransomware's Real Threat: Not the Ransom, the Extortion

1
Comments
7 min read
Update: pecheck.py Version 0.7.20

Update: pecheck.py Version 0.7.20

1
Comments
1 min read
Zombie ZIP Vulnerability Enables Malware to Bypass 95% of Antivirus Software, Requiring Urgent Security Updates

Zombie ZIP Vulnerability Enables Malware to Bypass 95% of Antivirus Software, Requiring Urgent Security Updates

Comments
8 min read
Create And Configure Azure Firewall

Create And Configure Azure Firewall

1
Comments
3 min read
Infinite Campus Salesforce Breach Exposes School Staff Data

Infinite Campus Salesforce Breach Exposes School Staff Data

1
Comments
1 min read
Bypassing Attestation Logic in Cairo: A Starknet Security Case Study

Bypassing Attestation Logic in Cairo: A Starknet Security Case Study

1
Comments
2 min read
When Storage Becomes Biology, Security Stops Being Purely Digital

When Storage Becomes Biology, Security Stops Being Purely Digital

1
Comments
2 min read
Agent.BTZ — how one USB stick rewrote modern cyber defence

Agent.BTZ — how one USB stick rewrote modern cyber defence

1
Comments
2 min read
OWASP Top 10 for LLM Applications 2025 — Plain English Explanation with Real Examples

OWASP Top 10 for LLM Applications 2025 — Plain English Explanation with Real Examples

Comments 1
7 min read
Self-Hosted Email Threat Detection: Real-Time Monitoring, Multi-Stage Enrichment, and LLM Verdicts with Legal Compliance

Self-Hosted Email Threat Detection: Real-Time Monitoring, Multi-Stage Enrichment, and LLM Verdicts with Legal Compliance

1
Comments
15 min read
🔑 The Silent Drift in Privilege Escalation

🔑 The Silent Drift in Privilege Escalation

1
Comments
4 min read
Passive Recon — How I Map Targets Without Ever Touching Them

Passive Recon — How I Map Targets Without Ever Touching Them

1
Comments
4 min read
The Road to AGI: What Artificial General Intelligence Means for Cybersecurity

The Road to AGI: What Artificial General Intelligence Means for Cybersecurity

Comments
4 min read
CVE-2026-32242: CVE-2026-32242: Authentication Bypass via Race Condition in Parse Server OAuth2 Adapter

CVE-2026-32242: CVE-2026-32242: Authentication Bypass via Race Condition in Parse Server OAuth2 Adapter

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.