DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Essential Free Web Penetration Testing Tools and Their Practical Use Cases

Essential Free Web Penetration Testing Tools and Their Practical Use Cases

5
Comments
3 min read
Beyond DevOps: My Journey to Mastering DevSecOps in 2026

Beyond DevOps: My Journey to Mastering DevSecOps in 2026

Comments
1 min read
The Cybersecurity Ego Taxonomy

The Cybersecurity Ego Taxonomy

19
Comments 4
2 min read
CVE-2026-1778: The Global Unverify: How One Line of Python Broke SageMaker TLS

CVE-2026-1778: The Global Unverify: How One Line of Python Broke SageMaker TLS

Comments
2 min read
Deploying My Headless Ubuntu Server

Deploying My Headless Ubuntu Server

4
Comments
2 min read
Zero-Touch Secrets: On-The-Wire Injection of Vault-Sourced Credentials

Zero-Touch Secrets: On-The-Wire Injection of Vault-Sourced Credentials

Comments
7 min read
Building an Encryption System: A Technical Deep Dive

Building an Encryption System: A Technical Deep Dive

7
Comments 1
6 min read
Protocols Visualizer: An Interactive Way to Learn Network Protocols

Protocols Visualizer: An Interactive Way to Learn Network Protocols

7
Comments
1 min read
Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

6
Comments 1
3 min read
El binomio perfecto: Intuición humana e IA en el Reverse Engineering

El binomio perfecto: Intuición humana e IA en el Reverse Engineering

1
Comments
1 min read
MIME Sniffing — the API issue nobody notices until it bites

MIME Sniffing — the API issue nobody notices until it bites

1
Comments
1 min read
The Overlooked Attack Surface in Enterprise RAG Systems

The Overlooked Attack Surface in Enterprise RAG Systems

Comments
2 min read
How Browser Fingerprinting Works

How Browser Fingerprinting Works

Comments
9 min read
Why BOLA Is #1 in OWASP API Top 10

Why BOLA Is #1 in OWASP API Top 10

Comments
3 min read
The Invisible Perimeter: Why Zero Day Vulnerabilities Are Now a Boardroom Crisis

The Invisible Perimeter: Why Zero Day Vulnerabilities Are Now a Boardroom Crisis

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.