DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Studying the Dangerous Responsibly: AI-Assisted Exploit Documentation as Ethical Practice

Studying the Dangerous Responsibly: AI-Assisted Exploit Documentation as Ethical Practice

Comments
11 min read
Common SOC 2 Failures (Real World)

Common SOC 2 Failures (Real World)

Comments
3 min read
Patch Tuesday abril 2026: Microsoft parcha 163 vulnerabilidades y un zero-day en SharePoint

Patch Tuesday abril 2026: Microsoft parcha 163 vulnerabilidades y un zero-day en SharePoint

Comments
10 min read
Ataque a Trivy: 340 GB filtrados de la Comisión Europea en 2026

Ataque a Trivy: 340 GB filtrados de la Comisión Europea en 2026

Comments
10 min read
Zero-day en Adobe Acrobat 2026: un PDF te puede hackear — actualizá ya

Zero-day en Adobe Acrobat 2026: un PDF te puede hackear — actualizá ya

Comments
10 min read
Understanding Human Vulnerability Models in Scam Design

Understanding Human Vulnerability Models in Scam Design

Comments
10 min read
I Built an Offline Threat-Hunting CLI in Python — Here's How ThreatLens Catches Real Attacks

I Built an Offline Threat-Hunting CLI in Python — Here's How ThreatLens Catches Real Attacks

1
Comments
3 min read
The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside

The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside

Comments
7 min read
How to Build a DIY USB Keylogger with ESP32-S3 (DuckLogger Tutorial)

How to Build a DIY USB Keylogger with ESP32-S3 (DuckLogger Tutorial)

Comments
3 min read
Explaining Prompt Injection & Image Injection & How to counter them

Explaining Prompt Injection & Image Injection & How to counter them

Comments
2 min read
AI Prompt Security: How Real-Time Filtering Stops Data Leaks

AI Prompt Security: How Real-Time Filtering Stops Data Leaks

1
Comments
5 min read
How CibrAI Automated 80% of Their Security Analyst Workflow With Agentic AI

How CibrAI Automated 80% of Their Security Analyst Workflow With Agentic AI

Comments
6 min read
What Happens If Mythos Ships Before the Patches Do

What Happens If Mythos Ships Before the Patches Do

Comments
4 min read
n8n Webhook Abuse: How Legitimate Automation Tools Are Being Turned Into Cyber Weapons

n8n Webhook Abuse: How Legitimate Automation Tools Are Being Turned Into Cyber Weapons

Comments
3 min read
On-Premise Testing for Banking Apps Without Trade-Offs in Compliance

On-Premise Testing for Banking Apps Without Trade-Offs in Compliance

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.