DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
eJPT Lab Walkthrough: Vulnerability Assessment

eJPT Lab Walkthrough: Vulnerability Assessment

Comments
3 min read
CVE-2026-0994: Recursive Hell: Breaking Python Protobuf with Nested 'Any' Messages

CVE-2026-0994: Recursive Hell: Breaking Python Protobuf with Nested 'Any' Messages

2
Comments
2 min read
Most API Breaches Don’t Hack You, They Walk In

Most API Breaches Don’t Hack You, They Walk In

Comments
2 min read
The Untouchable Hacker God: Deciphering Finland's Biggest Cybercrime

The Untouchable Hacker God: Deciphering Finland's Biggest Cybercrime

5
Comments
4 min read
Defend your app: 10 modern best practices for securing Web Applications

Defend your app: 10 modern best practices for securing Web Applications

Comments
5 min read
If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

1
Comments
3 min read
I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

1
Comments
4 min read
Weekly #03-2026: React2Shell Zero-Day Defense, Kubernetes Autoscaling Guide, AI Coding Guardrails & 2026 AI Acceleration

Weekly #03-2026: React2Shell Zero-Day Defense, Kubernetes Autoscaling Guide, AI Coding Guardrails & 2026 AI Acceleration

1
Comments
4 min read
Minutes for Attackers, Weeks for Defenders: Reducing Attack Surface in AWS

Minutes for Attackers, Weeks for Defenders: Reducing Attack Surface in AWS

7
Comments 1
4 min read
Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses

Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses

Comments
13 min read
The AI Attack You Can't See: Understanding Prompt Injection Risks

The AI Attack You Can't See: Understanding Prompt Injection Risks

Comments
2 min read
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

6
Comments 2
13 min read
The AI Arms Race: Why Mobile Brands Must Lead the Charge in Cybersecurity

The AI Arms Race: Why Mobile Brands Must Lead the Charge in Cybersecurity

1
Comments
4 min read
JavaScript Redirection Injection

JavaScript Redirection Injection

Comments
2 min read
How to DoS A server

How to DoS A server

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.