DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Handling CC Attacks with SafeLine WAF: A Practical Guide for Self-Hosted Environments

Handling CC Attacks with SafeLine WAF: A Practical Guide for Self-Hosted Environments

1
Comments
4 min read
AI Powered Attacks Are Hitting Firewalls

AI Powered Attacks Are Hitting Firewalls

1
Comments 1
5 min read
How I Built a Python Network Scanner That Thinks Like an Attacker

How I Built a Python Network Scanner That Thinks Like an Attacker

Comments
4 min read
A Weekend Exploring the World of Hackers, Scammers, and Online Deception

A Weekend Exploring the World of Hackers, Scammers, and Online Deception

1
Comments
5 min read
đź’ˇ The Hidden Cost of Trusting Default Security Po

đź’ˇ The Hidden Cost of Trusting Default Security Po

1
Comments
4 min read
The Interview Looked Real — The Candidate Wasn’t

The Interview Looked Real — The Candidate Wasn’t

1
Comments
2 min read
Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants

Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants

Comments
2 min read
Exploring Emoji-Based Prompt Manipulation in LLMs

Exploring Emoji-Based Prompt Manipulation in LLMs

Comments
1 min read
Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes

Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes

Comments
6 min read
Why Supply Chain Security Fails in the Real World

Why Supply Chain Security Fails in the Real World

Comments
7 min read
Privacy in Technology: Why It Matters More Than Ever

Privacy in Technology: Why It Matters More Than Ever

Comments
3 min read
When Proxies Become the Attack Vectors in Web Architectures

When Proxies Become the Attack Vectors in Web Architectures

1
Comments
5 min read
The Four Gates: A Practical Threat Model for Agentic AI Systems

The Four Gates: A Practical Threat Model for Agentic AI Systems

10
Comments 8
5 min read
Day 14: Linux Local Privilege Escalation — The Auditor's Roadmap 🕵️‍♂️

Day 14: Linux Local Privilege Escalation — The Auditor's Roadmap 🕵️‍♂️

Comments
1 min read
TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.