DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs

FBI Surveillance System Breach: Law Enforcement Infrastructure TTPs

Comments
5 min read
What I Found Scanning 30 Open-Source Repositories for CI/CD Identity Risks

What I Found Scanning 30 Open-Source Repositories for CI/CD Identity Risks

Comments
3 min read
How I Built a SQL-Driven User Access Review & Compliance Audit

How I Built a SQL-Driven User Access Review & Compliance Audit

Comments
3 min read
đź”’ The Shadow of Default Configurations

đź”’ The Shadow of Default Configurations

Comments
4 min read
The Pentagon Blacklisted the AI That Passed Our Security Tests. Then Deployed the One That Failed.

The Pentagon Blacklisted the AI That Passed Our Security Tests. Then Deployed the One That Failed.

1
Comments
9 min read
RED Delegated Act & EN 18031 — What It Actually Requires in Hardware

RED Delegated Act & EN 18031 — What It Actually Requires in Hardware

Comments
4 min read
Secure AI Architecture for Enterprise Systems

Secure AI Architecture for Enterprise Systems

4
Comments
4 min read
Day 12: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Day 12: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Comments
1 min read
AI Is Making Security More Agile: Highlights from ChiBrrCon 2026

AI Is Making Security More Agile: Highlights from ChiBrrCon 2026

2
Comments
8 min read
GHSA-46FP-8F5P-PF2M: GHSA-46fp-8f5p-pf2m: XSS Filter Bypass via Improper HTML Entity Decoding in Loofah allowed_uri?

GHSA-46FP-8F5P-PF2M: GHSA-46fp-8f5p-pf2m: XSS Filter Bypass via Improper HTML Entity Decoding in Loofah allowed_uri?

1
Comments
2 min read
Week 5

Week 5

Comments
2 min read
SQL Injection – Login Bypass | PortSwigger Lab Note #2

SQL Injection – Login Bypass | PortSwigger Lab Note #2

7
Comments
1 min read
Integrating a local mail server into my LDAP lab

Integrating a local mail server into my LDAP lab

Comments
6 min read
Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Comments
3 min read
I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.