DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

Comments
6 min read
GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

1
Comments
2 min read
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)

How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)

1
Comments
3 min read
Breaking: New "PleaseFix" Vulnerabilities Turn AI Agents Against Their Users

Breaking: New "PleaseFix" Vulnerabilities Turn AI Agents Against Their Users

Comments
3 min read
Day 11: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Day 11: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Comments
1 min read
Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis

Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis

Comments
5 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

Comments
3 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
How to Protect APIs from Cyber Attacks

How to Protect APIs from Cyber Attacks

Comments
3 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
Webinar on integrating SAST into DevSecOps

Webinar on integrating SAST into DevSecOps

1
Comments
1 min read
Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

1
Comments
21 min read
Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Comments
3 min read
Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.