DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
How a Small Engineering Team Secured Their Self-Hosted Stack with SafeLine WAF

How a Small Engineering Team Secured Their Self-Hosted Stack with SafeLine WAF

Comments
3 min read
Your AI Agent Has Too Much Power: Understanding and Taming Excessive Agency

Your AI Agent Has Too Much Power: Understanding and Taming Excessive Agency

Comments
5 min read
CVE-2026-23519: Betrayal by Optimization: How LLVM Broke Rust's Constant-Time Promises

CVE-2026-23519: Betrayal by Optimization: How LLVM Broke Rust's Constant-Time Promises

Comments
2 min read
CVE-2025-66292: DPanel's Delete Function Works Too Well: A Tale of Path Traversal

CVE-2025-66292: DPanel's Delete Function Works Too Well: A Tale of Path Traversal

Comments
2 min read
The ServiceNow AI Vulnerability: What Went Wrong and How to Secure Your AI Agents

The ServiceNow AI Vulnerability: What Went Wrong and How to Secure Your AI Agents

Comments 1
6 min read
B2B Payments: Best Practices to Secure Payment Processing

B2B Payments: Best Practices to Secure Payment Processing

10
Comments
9 min read
SSL/TLS & Encryption: Symmetric vs Asymmetric keys, Certificate Authorities, Mutual TLS (mTLS)

SSL/TLS & Encryption: Symmetric vs Asymmetric keys, Certificate Authorities, Mutual TLS (mTLS)

Comments
5 min read
🧭 Dominando el OWASP Top 10 (Edición 2025): El Plano de Seguridad para la Próxima Generación

🧭 Dominando el OWASP Top 10 (Edición 2025): El Plano de Seguridad para la Próxima Generación

Comments
4 min read
From Header Bidding Chaos to Control: How One Publisher Secured Their Ad Stack with SafeLine WAF

From Header Bidding Chaos to Control: How One Publisher Secured Their Ad Stack with SafeLine WAF

Comments
3 min read
The Goldman-JPMorgan Breaches Prove Enterprise Security Is Built on a Lie

The Goldman-JPMorgan Breaches Prove Enterprise Security Is Built on a Lie

Comments
6 min read
CrowdStrike Acquires Browser Security Firm Seraphic for $420 Million

CrowdStrike Acquires Browser Security Firm Seraphic for $420 Million

Comments
2 min read
The ServiceNow Vulnerability Reveals Why Enterprise AI Is a Security Time Bomb

The ServiceNow Vulnerability Reveals Why Enterprise AI Is a Security Time Bomb

Comments
7 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
Healthcare Ransomware Victims Deserve Sympathy, Not a Free Pass

Healthcare Ransomware Victims Deserve Sympathy, Not a Free Pass

Comments
5 min read
Brooklyn99 pwned!

Brooklyn99 pwned!

Comments
2 min read
My First Lesson in Cloud Security.

My First Lesson in Cloud Security.

Comments
4 min read
Extropy Security Bytes: w1 & w2, 2026

Extropy Security Bytes: w1 & w2, 2026

Comments
8 min read
The Rise of “DDoS-for-Hire” and What It Means for Small Businesses

The Rise of “DDoS-for-Hire” and What It Means for Small Businesses

Comments
6 min read
Stop trusting torch.load(): A complete guide to AI Supply Chain Security (Malware, Licenses, and Signing)

Stop trusting torch.load(): A complete guide to AI Supply Chain Security (Malware, Licenses, and Signing)

Comments
3 min read
Passing the PNPT: A Practical Perspective on Modern Pentesting

Passing the PNPT: A Practical Perspective on Modern Pentesting

Comments
3 min read
Build a Python Risk Scanner: Step-by-Step Beginner-Friendly Guide

Build a Python Risk Scanner: Step-by-Step Beginner-Friendly Guide

Comments
4 min read
Building Automated Containment for AI-to-AI Systems: A Technical Deep Dive

Building Automated Containment for AI-to-AI Systems: A Technical Deep Dive

Comments
8 min read
Week 4 Firewall Labs: 4 Production-Ready Firewall Scenarios with iptables

Week 4 Firewall Labs: 4 Production-Ready Firewall Scenarios with iptables

Comments
17 min read
Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

1
Comments
4 min read
loading...