DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OpenClaw Has 42,000 Exposed Instances — Including a Critical RCE That Lets Malicious Websites Hijack Your Bot

OpenClaw Has 42,000 Exposed Instances — Including a Critical RCE That Lets Malicious Websites Hijack Your Bot

Comments
7 min read
You Can Build on AgentSecrets

You Can Build on AgentSecrets

5
Comments
7 min read
Your AI Agent Is Now a Supply Chain Attack Target: The New Threat Model for Agentic AI

Your AI Agent Is Now a Supply Chain Attack Target: The New Threat Model for Agentic AI

Comments
8 min read
Cybersecurity Audit Proposal: How to Sell Security as an Investment, Not a Cost

Cybersecurity Audit Proposal: How to Sell Security as an Investment, Not a Cost

Comments
5 min read
OpenClaw: The Open-Source AI Assistant That Exposed 42,000 Servers — And Nobody Noticed

OpenClaw: The Open-Source AI Assistant That Exposed 42,000 Servers — And Nobody Noticed

2
Comments 1
7 min read
CVE-2026-28446: The OpenClaw Voice RCE That Makes 42,000 AI Instances Remotely Exploitable

CVE-2026-28446: The OpenClaw Voice RCE That Makes 42,000 AI Instances Remotely Exploitable

1
Comments
6 min read
CVE-2026-25253: One-Click RCE on 42,000 AI Assistants — The OpenClaw Security Catastrophe

CVE-2026-25253: One-Click RCE on 42,000 AI Assistants — The OpenClaw Security Catastrophe

Comments
7 min read
Chapter 4: Linux Capabilities

Chapter 4: Linux Capabilities

1
Comments
19 min read
How AI Flagged Me For Being In Cybersecurity

How AI Flagged Me For Being In Cybersecurity

Comments
1 min read
CVE-2026-28446 (CVSS 9.8): OpenClaw Voice Extension RCE — What You Need to Know

CVE-2026-28446 (CVSS 9.8): OpenClaw Voice Extension RCE — What You Need to Know

Comments
5 min read
From Zero to 140 Features: How I Built a Cloud SOC Platform as a Solo Developer

From Zero to 140 Features: How I Built a Cloud SOC Platform as a Solo Developer

2
Comments
4 min read
Bypassing all Active Directory password policies with one RPC call (with PoC)

Bypassing all Active Directory password policies with one RPC call (with PoC)

1
Comments
1 min read
Zero Trust for AI Agents: Why I Built a "Handshake Protocol" (IATP)

Zero Trust for AI Agents: Why I Built a "Handshake Protocol" (IATP)

Comments
3 min read
🔐 Decentralized Identity: The Future of Secure Authentication on the Web

🔐 Decentralized Identity: The Future of Secure Authentication on the Web

1
Comments 1
3 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.