DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Addressing VoIP/WebRTC Security Training Gaps with a Standardized Vulnerable Lab Environment

Addressing VoIP/WebRTC Security Training Gaps with a Standardized Vulnerable Lab Environment

Comments
9 min read
Vetran: Trust Infrastructure for AI Agents

Vetran: Trust Infrastructure for AI Agents

Comments
2 min read
EDR/XDR Bypass and Detection Evasion Techniques: An Investigation of Advanced Evasion Strategies from a Red Team Perspective

EDR/XDR Bypass and Detection Evasion Techniques: An Investigation of Advanced Evasion Strategies from a Red Team Perspective

5
Comments
40 min read
EtherHiding in 2026: How Attackers Weaponize Smart Contracts as Malware Infrastructure — And How to Detect It

EtherHiding in 2026: How Attackers Weaponize Smart Contracts as Malware Infrastructure — And How to Detect It

Comments
6 min read
Why Signature Based Detection is Mathematically Obsolete

Why Signature Based Detection is Mathematically Obsolete

Comments
4 min read
How I Built a Memory-Safe Steganography Engine in Rust to Protect Data from AI Scrapers

How I Built a Memory-Safe Steganography Engine in Rust to Protect Data from AI Scrapers

1
Comments
3 min read
Anthropic Data Leak: How Ops Failures Undermine AI Safety

Anthropic Data Leak: How Ops Failures Undermine AI Safety

1
Comments
7 min read
Critical Security Alert: Malicious VSCode Extension "solidity-macos" Contains Backdoor

Critical Security Alert: Malicious VSCode Extension "solidity-macos" Contains Backdoor

1
Comments
9 min read
The Rise of the AI Worm: How Self-Replicating Prompts Threaten Multi-Agent Systems

The Rise of the AI Worm: How Self-Replicating Prompts Threaten Multi-Agent Systems

5
Comments
3 min read
Approaches to code reviews

Approaches to code reviews

Comments
6 min read
The Architectural Problem With Compliance-as-a-Service

The Architectural Problem With Compliance-as-a-Service

Comments
3 min read
GHSA-PRH4-VHFH-24MJ: GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs

GHSA-PRH4-VHFH-24MJ: GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs

1
Comments
2 min read
The "Authority" Angle: Mapping the Invisible: A Deep Dive into TheBigBrother OSINT

The "Authority" Angle: Mapping the Invisible: A Deep Dive into TheBigBrother OSINT

Comments
2 min read
CanisterWorm Malware Wipes Data on Iranian Machines via Compromised npm Packages and ICP Canisters

CanisterWorm Malware Wipes Data on Iranian Machines via Compromised npm Packages and ICP Canisters

1
Comments 1
7 min read
What Is Digital Risk Protection? An Honest Look at a Overclaimed Category

What Is Digital Risk Protection? An Honest Look at a Overclaimed Category

1
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.