DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
An In-Depth Look at CIP: The Impact of Virtual Cameras and AI Face Swapping on Identity Verification, and How to Address It

An In-Depth Look at CIP: The Impact of Virtual Cameras and AI Face Swapping on Identity Verification, and How to Address It

Comments
5 min read
Navia Benefit Solutions' BOLA Vulnerability Exposed PII of 10,000+ Employees Due to Inadequate Access Controls

Navia Benefit Solutions' BOLA Vulnerability Exposed PII of 10,000+ Employees Due to Inadequate Access Controls

1
Comments
14 min read
RSA Conference 2026: The Week Vibe Coding Security Became Impossible to Ignore

RSA Conference 2026: The Week Vibe Coding Security Became Impossible to Ignore

Comments
3 min read
Claude Computer Use Security Risks: What Giving an LLM OS-Level Control Actually Means [2026]

Claude Computer Use Security Risks: What Giving an LLM OS-Level Control Actually Means [2026]

Comments 1
7 min read
We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

Comments
10 min read
Anatomy of a Supply Chain Attack: How LiteLLM Was Weaponized in 6 Hours

Anatomy of a Supply Chain Attack: How LiteLLM Was Weaponized in 6 Hours

Comments
8 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
GHSA-5VP3-3CG6-2RQ3: GHSA-5VP3-3CG6-2RQ3: Cross-Site Scripting via Markdown Serialization Breakout in justhtml

GHSA-5VP3-3CG6-2RQ3: GHSA-5VP3-3CG6-2RQ3: Cross-Site Scripting via Markdown Serialization Breakout in justhtml

Comments
2 min read
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows

Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows

Comments
3 min read
Shipping Fast with AI? You’re Probably Shipping Vulnerabilities Too.

Shipping Fast with AI? You’re Probably Shipping Vulnerabilities Too.

Comments
1 min read
Find Plaintext Secrets Hiding in Your .env Files

Find Plaintext Secrets Hiding in Your .env Files

Comments
4 min read
🚀 I Built an AI Powered Cybersecurity Assistant – CyberScan AI (Now Live)

🚀 I Built an AI Powered Cybersecurity Assistant – CyberScan AI (Now Live)

Comments
1 min read
Day 31: Speed vs. Complexity — The Pentester's Hierarchy of Exploitation 🕵️‍♂️

Day 31: Speed vs. Complexity — The Pentester's Hierarchy of Exploitation 🕵️‍♂️

Comments
1 min read
I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them

I Tested My Security Scanner on 500 Sites and Found It Was Lying About 158 of Them

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.