DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Approaches to code reviews

Approaches to code reviews

Comments
6 min read
The Architectural Problem With Compliance-as-a-Service

The Architectural Problem With Compliance-as-a-Service

Comments
3 min read
GHSA-PRH4-VHFH-24MJ: GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs

GHSA-PRH4-VHFH-24MJ: GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs

1
Comments
2 min read
MCP Security Report — March 2026: 30 CVEs, 437K Compromised Downloads

MCP Security Report — March 2026: 30 CVEs, 437K Compromised Downloads

1
Comments
2 min read
Unpacking the AI Frontier: Lessons from the Claude Mythos/Capybara Leak

Unpacking the AI Frontier: Lessons from the Claude Mythos/Capybara Leak

5
Comments
5 min read
Stop Buying Proxy Lists: Scive Real-Time Proxies with Node.js

Stop Buying Proxy Lists: Scive Real-Time Proxies with Node.js

Comments 2
2 min read
CanisterWorm Malware Wipes Data on Iranian Machines via Compromised npm Packages and ICP Canisters

CanisterWorm Malware Wipes Data on Iranian Machines via Compromised npm Packages and ICP Canisters

1
Comments 1
7 min read
Navia Benefit Solutions' BOLA Vulnerability Exposed PII of 10,000+ Employees Due to Inadequate Access Controls

Navia Benefit Solutions' BOLA Vulnerability Exposed PII of 10,000+ Employees Due to Inadequate Access Controls

1
Comments
14 min read
RSA Conference 2026: The Week Vibe Coding Security Became Impossible to Ignore

RSA Conference 2026: The Week Vibe Coding Security Became Impossible to Ignore

Comments
3 min read
Anatomy of a Supply Chain Attack: How LiteLLM Was Weaponized in 6 Hours

Anatomy of a Supply Chain Attack: How LiteLLM Was Weaponized in 6 Hours

Comments
8 min read
We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

Comments
10 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
GHSA-5VP3-3CG6-2RQ3: GHSA-5VP3-3CG6-2RQ3: Cross-Site Scripting via Markdown Serialization Breakout in justhtml

GHSA-5VP3-3CG6-2RQ3: GHSA-5VP3-3CG6-2RQ3: Cross-Site Scripting via Markdown Serialization Breakout in justhtml

Comments
2 min read
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows

Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.