DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
SQL Injection – time delays and information retrieval| PortSwigger Lab Note #10

SQL Injection – time delays and information retrieval| PortSwigger Lab Note #10

Comments
1 min read
🛡️ Hardening VPS Ubuntu: Mengunci Pintu dari Serangan Botnet

🛡️ Hardening VPS Ubuntu: Mengunci Pintu dari Serangan Botnet

Comments
2 min read
ScamDetect: Building a Multilingual AI-Powered Phishing Detection Platform

ScamDetect: Building a Multilingual AI-Powered Phishing Detection Platform

2
Comments
13 min read
30 Cybersecurity Statistics You Must Know in 2026

30 Cybersecurity Statistics You Must Know in 2026

Comments
9 min read
AI Agents Hacking Enterprises: The McKinsey Breach and What Developers Need to Know

AI Agents Hacking Enterprises: The McKinsey Breach and What Developers Need to Know

6
Comments
4 min read
xmrwallet.com Scam: How NameSilo Became the Press Secretary for a $2M Monero Theft Operation

xmrwallet.com Scam: How NameSilo Became the Press Secretary for a $2M Monero Theft Operation

1
Comments
13 min read
Social Engineering Attacks on IT Helpdesks: A Defence Guide

Social Engineering Attacks on IT Helpdesks: A Defence Guide

Comments
7 min read
Stryker's Wiper Attack Exposes Cloud Management's Achilles Heel

Stryker's Wiper Attack Exposes Cloud Management's Achilles Heel

1
Comments
7 min read
I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing

I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing

1
Comments
2 min read
Day 19: Linux Capabilities — The "Silent" Path to Root 🕵️‍♂️

Day 19: Linux Capabilities — The "Silent" Path to Root 🕵️‍♂️

Comments
1 min read
GHSA-V8W9-8MX6-G223: GHSA-v8w9-8mx6-g223: Prototype Pollution in Hono parseBody Utility

GHSA-V8W9-8MX6-G223: GHSA-v8w9-8mx6-g223: Prototype Pollution in Hono parseBody Utility

1
Comments
2 min read
LLMjacking — How AI API Key Theft Works and How to Prevent It

LLMjacking — How AI API Key Theft Works and How to Prevent It

1
Comments
8 min read
I Built an AI That Conducts Cybersecurity Interviews (and Scores You in Real-Time

I Built an AI That Conducts Cybersecurity Interviews (and Scores You in Real-Time

2
Comments
5 min read
Eradication in Incident Handling

Eradication in Incident Handling

Comments
2 min read
How to Reduce Software Development Costs Without Sacrificing Quality

How to Reduce Software Development Costs Without Sacrificing Quality

1
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.