DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I built a Python tool to hunt down Remote Access Trojans on Windows

I built a Python tool to hunt down Remote Access Trojans on Windows

Comments
1 min read
7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

3
Comments
9 min read
Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

6
Comments
4 min read
🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38

🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38

17
Comments
11 min read
I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

Comments
1 min read
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

1
Comments
6 min read
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

1
Comments
7 min read
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

1
Comments
12 min read
How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

1
Comments
6 min read
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

1
Comments 1
7 min read
Hackers Rob. Security Reads the Manual.

Hackers Rob. Security Reads the Manual.

Comments
3 min read
SafeLine v9.3.0: Evolving a Semantic Analysis WAF for Modern Web Security

SafeLine v9.3.0: Evolving a Semantic Analysis WAF for Modern Web Security

Comments
3 min read
No Complex Regular Expressions Required: The New SLS Data Masking Function Makes Privacy Protection Simpler and More Efficient

No Complex Regular Expressions Required: The New SLS Data Masking Function Makes Privacy Protection Simpler and More Efficient

Comments
7 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

1
Comments
7 min read
When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Why Semantic Analysis Is the Only Sustainable WAF Strategy Going Forward

Why Semantic Analysis Is the Only Sustainable WAF Strategy Going Forward

Comments
3 min read
Defending the Skies: Anti-Jamming and GPS Spoofing in UAVs

Defending the Skies: Anti-Jamming and GPS Spoofing in UAVs

Comments
1 min read
SafeLine v9.3.0: Major Upgrade with Semantic Analysis Detection Engine

SafeLine v9.3.0: Major Upgrade with Semantic Analysis Detection Engine

Comments
3 min read
CVE-2026-23745: Tar-pit of Doom: Escaping the Root in node-tar

CVE-2026-23745: Tar-pit of Doom: Escaping the Root in node-tar

Comments 1
2 min read
AI-to-AI Communication: Navigating the Risks in an Interconnected AI Ecosystem

AI-to-AI Communication: Navigating the Risks in an Interconnected AI Ecosystem

Comments 4
4 min read
Healthcare Data Breaches Have Become Cost Centers, Not Emergencies

Healthcare Data Breaches Have Become Cost Centers, Not Emergencies

Comments
6 min read
Planning for ISO 27001 Certification? Here’s What the Cost Looks Like

Planning for ISO 27001 Certification? Here’s What the Cost Looks Like

Comments
4 min read
How Security Fits into a CI/CD Pipeline (Beginner-Friendly Breakdown)

How Security Fits into a CI/CD Pipeline (Beginner-Friendly Breakdown)

3
Comments
1 min read
Cybersecurity Best Practices for Developers: A Practical Guide with Code Examples

Cybersecurity Best Practices for Developers: A Practical Guide with Code Examples

Comments
9 min read
loading...