DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Adversarial Attacks and Defenses in Deep Learning Systems: Threats, Mechanisms, and Countermeasures

Adversarial Attacks and Defenses in Deep Learning Systems: Threats, Mechanisms, and Countermeasures

1
Comments
6 min read
Cybeetle: A Practical AI Layer for Security Analysis in Modern Codebases

Cybeetle: A Practical AI Layer for Security Analysis in Modern Codebases

1
Comments
2 min read
Kali Linux 2026.1 Is Here — And It Brought a Time Machine 🚀

Kali Linux 2026.1 Is Here — And It Brought a Time Machine 🚀

1
Comments
6 min read
Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️

Day 28: Advanced Pivoting — Reverse Tunnels and The 127.0.0.1 Gateway 🕵️‍♂️

Comments
1 min read
Trivy Vulnerability Scanner Compromised in Supply Chain Attack: Mitigation Steps and User Guidance

Trivy Vulnerability Scanner Compromised in Supply Chain Attack: Mitigation Steps and User Guidance

1
Comments
8 min read
AI Security: My Takeaways on Adversarial Attacks by Anadi Goyal

AI Security: My Takeaways on Adversarial Attacks by Anadi Goyal

2
Comments
1 min read
Prompt Injection, Jailbreaks, and LLM Security: What Every Developer Building AI Apps Must Know

Prompt Injection, Jailbreaks, and LLM Security: What Every Developer Building AI Apps Must Know

Comments 1
10 min read
Unlocking the Future: Cutting-Edge Authentication Strategies for Mobile App Development

Unlocking the Future: Cutting-Edge Authentication Strategies for Mobile App Development

1
Comments
2 min read
Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed

Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed

Comments
12 min read
DarkSword iOS Exploit Analysis: Evaluating Lookout's LLM-Assisted Findings Against Other Research Teams

DarkSword iOS Exploit Analysis: Evaluating Lookout's LLM-Assisted Findings Against Other Research Teams

1
Comments
12 min read
We Won a Cybersecurity Award — But Here’s the Real Problem We’re Solving

We Won a Cybersecurity Award — But Here’s the Real Problem We’re Solving

Comments
2 min read
GHSA-GRR9-747V-XVCP: GHSA-GRR9-747V-XVCP: Uncontrolled Recursion in Scriban Templates Leads to Denial of Service

GHSA-GRR9-747V-XVCP: GHSA-GRR9-747V-XVCP: Uncontrolled Recursion in Scriban Templates Leads to Denial of Service

Comments
2 min read
🚨 LiteLLM Supply Chain Attack: A Deep Dive

🚨 LiteLLM Supply Chain Attack: A Deep Dive

Comments
5 min read
SSRF Attack — When the Server Becomes the Attacker | CAISD

SSRF Attack — When the Server Becomes the Attacker | CAISD

Comments
2 min read
The Hidden Risks of Misplaced Trust in Modern Authentication Systems

The Hidden Risks of Misplaced Trust in Modern Authentication Systems

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.