DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building a Fast Automated Web Security Scanner Using Python and Open-Source Linux Tools

Building a Fast Automated Web Security Scanner Using Python and Open-Source Linux Tools

3
Comments 2
6 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion

Shields Up Defense Tech: Red Team Attack Surface Expansion

Comments
5 min read
OpenLDAP home lab - Cyber Security technical write up

OpenLDAP home lab - Cyber Security technical write up

2
Comments
12 min read
How ClawMoat Would Have Prevented ClawHavoc: A Technical Case Study

How ClawMoat Would Have Prevented ClawHavoc: A Technical Case Study

Comments
5 min read
CrowdStrike Says OpenClaw Is Dangerous. They're Right. Here's What To Do About It.

CrowdStrike Says OpenClaw Is Dangerous. They're Right. Here's What To Do About It.

Comments
5 min read
RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘

RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘

5
Comments
3 min read
CrowdStrike Says OpenClaw Is Dangerous. They're Right. Here's What To Do About It.

CrowdStrike Says OpenClaw Is Dangerous. They're Right. Here's What To Do About It.

Comments
5 min read
How ClawMoat Would Have Prevented ClawHavoc

How ClawMoat Would Have Prevented ClawHavoc

Comments
5 min read
CVE-2026-27206: The Zumba Class Dance: RCE via PHP Object Injection in json-serializer

CVE-2026-27206: The Zumba Class Dance: RCE via PHP Object Injection in json-serializer

Comments
2 min read
Anthropic Just Published a Kill Chain for AI Model Theft. Let's Break It Down.

Anthropic Just Published a Kill Chain for AI Model Theft. Let's Break It Down.

Comments 4
7 min read
Lazarus Group Evolves: From Fake token coins to Fake CVEs — New GitHub Phishing Wave

Lazarus Group Evolves: From Fake token coins to Fake CVEs — New GitHub Phishing Wave

16
Comments
5 min read
Step-by-Step Guide to Creating a Cyber Risk Assessment Tool for Small Businesses

Step-by-Step Guide to Creating a Cyber Risk Assessment Tool for Small Businesses

Comments
3 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Comments 1
1 min read
EDR/XDR Bypass and Detection Evasion Techniques: An Investigation of Advanced Evasion Strategies from a Red Team Perspective

EDR/XDR Bypass and Detection Evasion Techniques: An Investigation of Advanced Evasion Strategies from a Red Team Perspective

7
Comments
40 min read
I Let Users Write HTML Templates - Here Are 6 Security Holes I Had to Patch

I Let Users Write HTML Templates - Here Are 6 Security Holes I Had to Patch

4
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.