DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Detecting and Mitigating Unauthorized Surveillance: Strategies to Protect Personal Devices from State and Non-State Actors

Detecting and Mitigating Unauthorized Surveillance: Strategies to Protect Personal Devices from State and Non-State Actors

1
Comments
13 min read
The Illusion of Compliance: What Developers Need to Know About AI Alignment Faking

The Illusion of Compliance: What Developers Need to Know About AI Alignment Faking

5
Comments 1
5 min read
What Is a "Cyber Ninja"? — The World of Full-Stack Hacking

What Is a "Cyber Ninja"? — The World of Full-Stack Hacking

1
Comments
4 min read
MediaTek's Security Nightmare: How a Nothing Phone Was Hacked in 45 Seconds (Except It Wasn't)

MediaTek's Security Nightmare: How a Nothing Phone Was Hacked in 45 Seconds (Except It Wasn't)

1
Comments
6 min read
I Logged 1 Million Requests to My Server — Here's What I Found

I Logged 1 Million Requests to My Server — Here's What I Found

Comments
3 min read
SQL Injection – Blind SQL injection with conditional errors | PortSwigger Lab Note #9

SQL Injection – Blind SQL injection with conditional errors | PortSwigger Lab Note #9

1
Comments
1 min read
NEW Firmware Challenges - Weekly Incidents

NEW Firmware Challenges - Weekly Incidents

1
Comments
1 min read
1 in 4 SMBs Hacked Despite Security Measures: Key Findings from Proton's 2026 Report

1 in 4 SMBs Hacked Despite Security Measures: Key Findings from Proton's 2026 Report

Comments
2 min read
Microsoft's March 2026 Patch Tuesday: Two Zero-Days Are Being Exploited Right Now. Patch Immediately.

Microsoft's March 2026 Patch Tuesday: Two Zero-Days Are Being Exploited Right Now. Patch Immediately.

1
Comments
6 min read
Cross-Site Scripting (XSS) Explained for Developers

Cross-Site Scripting (XSS) Explained for Developers

Comments
3 min read
Stryker Devices Compromised: Unauthorized Access, Data Wiping, and Entra Login Page Defacement by Handala-Linked Entity

Stryker Devices Compromised: Unauthorized Access, Data Wiping, and Entra Login Page Defacement by Handala-Linked Entity

Comments
12 min read
Cybersecurity Analyst Question Bank

Cybersecurity Analyst Question Bank

Comments
119 min read
MP1 Write‑Up – Stack Smashing

MP1 Write‑Up – Stack Smashing

1
Comments
6 min read
SQL Injection – Blind SQL injection with conditional responses | PortSwigger Lab Note #8

SQL Injection – Blind SQL injection with conditional responses | PortSwigger Lab Note #8

Comments
1 min read
How AI Is Making Cyber Attacks Smarter in Cloud Environments

How AI Is Making Cyber Attacks Smarter in Cloud Environments

1
Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.