DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SpyHunt

SpyHunt

1
Comments
13 min read
Prompt Injection Attacks: The Hidden Security Threat in AI Applications

Prompt Injection Attacks: The Hidden Security Threat in AI Applications

1
Comments
14 min read
Cyber Security Syllabus for MAKAUT 7th Semester

Cyber Security Syllabus for MAKAUT 7th Semester

Comments
1 min read
From MVP to Scale: Automated Security Testing for Every Startup Stage

From MVP to Scale: Automated Security Testing for Every Startup Stage

Comments
4 min read
🚀 AstralGuard Cyber Night Talk: Exploring the Future of AI & Cybersecurity 🛡️🤖

🚀 AstralGuard Cyber Night Talk: Exploring the Future of AI & Cybersecurity 🛡️🤖

Comments
2 min read
5 Critical AI Agent Security Threats Developers Need to Know for 2026

5 Critical AI Agent Security Threats Developers Need to Know for 2026

5
Comments 1
4 min read
MCP Security 101: Protecting Your AI Agents from "God-Mode" Risks

MCP Security 101: Protecting Your AI Agents from "God-Mode" Risks

5
Comments 1
5 min read
How SafeLine WAF Transformed Our Web Security: A Real User Case Study

How SafeLine WAF Transformed Our Web Security: A Real User Case Study

5
Comments
4 min read
SafeLine WAF: Stop Web Attacks Before They Stop You

SafeLine WAF: Stop Web Attacks Before They Stop You

Comments
2 min read
The Day I Stopped Chasing Everything and Found My One Thing

The Day I Stopped Chasing Everything and Found My One Thing

39
Comments 3
6 min read
Stop the Hijack: A Developer's Guide to AI Agent Security and Tool Guardrails

Stop the Hijack: A Developer's Guide to AI Agent Security and Tool Guardrails

5
Comments 1
5 min read
Stop Buying the Wrong Wi-Fi Adapter for Kali Linux (2025 Guide)

Stop Buying the Wrong Wi-Fi Adapter for Kali Linux (2025 Guide)

Comments
2 min read
Cyber Segurança em Angola

Cyber Segurança em Angola

Comments
1 min read
The 100:1 Deficit: Why Your Security Team Needs an AI Multiplier

The 100:1 Deficit: Why Your Security Team Needs an AI Multiplier

Comments
5 min read
I’ve Been Doing This for 25 Years and I Still Google Everything

I’ve Been Doing This for 25 Years and I Still Google Everything

10
Comments 2
2 min read
ZetaShare | Building Truly private file transfer with WebRTC

ZetaShare | Building Truly private file transfer with WebRTC

Comments
2 min read
SafeLine: A Modern, Developer-Friendly Self-Hosted WAF for Real-World Threats

SafeLine: A Modern, Developer-Friendly Self-Hosted WAF for Real-World Threats

5
Comments
4 min read
Fraud Detection with Knowledge Graphs: A Protégé and VidyaAstra Approach

Fraud Detection with Knowledge Graphs: A Protégé and VidyaAstra Approach

Comments
16 min read
SafeLine: The Open-Source WAF That Protects Your Web Applications from Every Angle

SafeLine: The Open-Source WAF That Protects Your Web Applications from Every Angle

Comments 1
4 min read
Why Wazuh Missed React2Shell

Why Wazuh Missed React2Shell

1
Comments
6 min read
7 Urgent Fixes: Fortinet SAML Auth Bypass

7 Urgent Fixes: Fortinet SAML Auth Bypass

3
Comments
6 min read
SafeLine: A Modern Take on Self-Hosted Web Application Security

SafeLine: A Modern Take on Self-Hosted Web Application Security

Comments
4 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

Comments
2 min read
Red Queen Hypothesis and The Crescendo Jailbreak Attack Explained

Red Queen Hypothesis and The Crescendo Jailbreak Attack Explained

Comments
3 min read
Securing Cross-Border E-Commerce with SafeLine: A Case Study of Protecting an Independent Online Store

Securing Cross-Border E-Commerce with SafeLine: A Case Study of Protecting an Independent Online Store

Comments
5 min read
loading...