DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Tấn Công Chuỗi Cung Ứng axios@1.14.1: Cần Làm Gì Ngay?

Tấn Công Chuỗi Cung Ứng axios@1.14.1: Cần Làm Gì Ngay?

Comments
10 min read
Ataque à cadeia de suprimentos axios@1.14.1: O que fazer agora

Ataque à cadeia de suprimentos axios@1.14.1: O que fazer agora

Comments
9 min read
Fleetfolio: Making Penetration Testing Accessible to Everyone

Fleetfolio: Making Penetration Testing Accessible to Everyone

Comments
2 min read
How I built a binary ELF/PE analyzer (Phase 2)

How I built a binary ELF/PE analyzer (Phase 2)

Comments
5 min read
Izumi: An LLM-Powered SBOM Tool Built Out of Frustration

Izumi: An LLM-Powered SBOM Tool Built Out of Frustration

Comments
3 min read
95% of orgs generate SBOMs, but 75% of those SBOMs are static ghosts

95% of orgs generate SBOMs, but 75% of those SBOMs are static ghosts

2
Comments
4 min read
Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)

Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)

Comments
2 min read
ChatGPT Extension Privacy: The Browser Itself Is the Leak

ChatGPT Extension Privacy: The Browser Itself Is the Leak

Comments
8 min read
AI Recommendation Poisoning: When Your Assistant Works Against You

AI Recommendation Poisoning: When Your Assistant Works Against You

Comments
1 min read
Building a Zero Trust Security Architecture in Your Home Lab: A Practical Implementation Guide

Building a Zero Trust Security Architecture in Your Home Lab: A Practical Implementation Guide

Comments
10 min read
What is a Cryptographic Audit Trail — and Why AI Agents Need One

What is a Cryptographic Audit Trail — and Why AI Agents Need One

Comments
2 min read
Building 646 Suricata Rules to Detect AI Agent Threats: OpenClaw Security with CGTI Lite

Building 646 Suricata Rules to Detect AI Agent Threats: OpenClaw Security with CGTI Lite

Comments
6 min read
Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline

Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline

Comments
3 min read
NPM Supply Chain Attacks in 2026: Why Libraries Like Axios Are Prime Targets [Guide]

NPM Supply Chain Attacks in 2026: Why Libraries Like Axios Are Prime Targets [Guide]

Comments
7 min read
(CVE-2026-27489) - Two Incomplete Fixes for a Path Traversal Vulnerability in ONNX

(CVE-2026-27489) - Two Incomplete Fixes for a Path Traversal Vulnerability in ONNX

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.