DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
đź”’ The Shadow of Default Configurations

đź”’ The Shadow of Default Configurations

Comments
4 min read
RED Delegated Act & EN 18031 — What It Actually Requires in Hardware

RED Delegated Act & EN 18031 — What It Actually Requires in Hardware

Comments
4 min read
Secure AI Architecture for Enterprise Systems

Secure AI Architecture for Enterprise Systems

4
Comments
4 min read
CYBERSECURITY

CYBERSECURITY

Comments 1
1 min read
AI Is Making Security More Agile: Highlights from ChiBrrCon 2026

AI Is Making Security More Agile: Highlights from ChiBrrCon 2026

2
Comments
8 min read
Architecting Guardian-AI: Multi-Layered Content Integrity Filters for Autonomous Publishing

Architecting Guardian-AI: Multi-Layered Content Integrity Filters for Autonomous Publishing

Comments
7 min read
GHSA-46FP-8F5P-PF2M: GHSA-46fp-8f5p-pf2m: XSS Filter Bypass via Improper HTML Entity Decoding in Loofah allowed_uri?

GHSA-46FP-8F5P-PF2M: GHSA-46fp-8f5p-pf2m: XSS Filter Bypass via Improper HTML Entity Decoding in Loofah allowed_uri?

1
Comments
2 min read
The Axios Supply Chain Attack: What Happened, How to Check, and What to Do Next

The Axios Supply Chain Attack: What Happened, How to Check, and What to Do Next

7
Comments 4
8 min read
Integrating a local mail server into my LDAP lab

Integrating a local mail server into my LDAP lab

Comments
6 min read
I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

1
Comments
2 min read
Claude Mythos Finds Bugs Like a Senior Dev Finds Excuses to Skip Standup

Claude Mythos Finds Bugs Like a Senior Dev Finds Excuses to Skip Standup

2
Comments 1
7 min read
The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

Comments
6 min read
GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

1
Comments
2 min read
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)

How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)

1
Comments
3 min read
Breaking: New "PleaseFix" Vulnerabilities Turn AI Agents Against Their Users

Breaking: New "PleaseFix" Vulnerabilities Turn AI Agents Against Their Users

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.