DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
When a Radio Signal Stops a Train

When a Radio Signal Stops a Train

Comments
3 min read
I Gave My Home SOC a Local Gemma 4 Analyst

Gemma 4 Challenge: Build With Gemma 4 Submission

I Gave My Home SOC a Local Gemma 4 Analyst

2
Comments
3 min read
Lessons from Log4Shell: Building a CRA-Ready Log4j

Lessons from Log4Shell: Building a CRA-Ready Log4j

Comments
7 min read
Building Mithridatium: Detecting Hidden Backdoors in ML Models

Building Mithridatium: Detecting Hidden Backdoors in ML Models

Comments
4 min read
Agentic AI Identity Is the Next Frontier in Trust and Compliance

Agentic AI Identity Is the Next Frontier in Trust and Compliance

Comments
4 min read
No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours

No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours

Comments
3 min read
Testing Sigma Rules Against Local Logs Without a SIEM

Testing Sigma Rules Against Local Logs Without a SIEM

Comments
4 min read
5 Tips to Keep Your VPS Safe from Vulnerabilities

5 Tips to Keep Your VPS Safe from Vulnerabilities

Comments
4 min read
Lattice-Based Cryptography: Foundation of PQC

Lattice-Based Cryptography: Foundation of PQC

Comments
9 min read
In-depth Investigation of API Transit Stations: From Black Gray Products to White Gloves, Where is the Future of Domestic AI?

In-depth Investigation of API Transit Stations: From Black Gray Products to White Gloves, Where is the Future of Domestic AI?

Comments
17 min read
Why Hardware-Bound Passkeys Still Struggle

Why Hardware-Bound Passkeys Still Struggle

Comments
3 min read
I built 404Found: free tools to check scam texts, suspicious phone numbers, and fix everyday tech problems

I built 404Found: free tools to check scam texts, suspicious phone numbers, and fix everyday tech problems

Comments
2 min read
XSS Explained: How Attackers Execute JavaScript Inside Your Application

XSS Explained: How Attackers Execute JavaScript Inside Your Application

Comments
3 min read
New CVEs in Ollama & DAEMON Tools; Webhooks Lack Signature Checks

New CVEs in Ollama & DAEMON Tools; Webhooks Lack Signature Checks

Comments
4 min read
The Silent Backdoor in Enterprise Security: Why Unmanaged OAuth Tokens Are the New High-Risk Vector

The Silent Backdoor in Enterprise Security: Why Unmanaged OAuth Tokens Are the New High-Risk Vector

2
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.