DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Webinar on integrating SAST into DevSecOps

Webinar on integrating SAST into DevSecOps

1
Comments
1 min read
Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

1
Comments
21 min read
Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Comments
3 min read
Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

Silver Dragon APT: Google Drive C2 & Cobalt Strike Government TTPs

1
Comments
5 min read
Zero-Trust Architecture in Practice: Real-World Implementation Steps

Zero-Trust Architecture in Practice: Real-World Implementation Steps

Comments
4 min read
Hi, I'm A Security-Minded Software Engineer from Japanđź‘‹

Hi, I'm A Security-Minded Software Engineer from Japanđź‘‹

1
Comments
2 min read
VPN Kill Switch Explained: A Technical Deep Dive into Privacy Protection

VPN Kill Switch Explained: A Technical Deep Dive into Privacy Protection

1
Comments
3 min read
We Red-Teamed Our Own AI Agent (And It Failed Spectacularly)

We Red-Teamed Our Own AI Agent (And It Failed Spectacularly)

1
Comments
10 min read
Improper Disposal of Sensitive Data in Waste Facilities: Implementing Secure Shredding and Disposal Protocols

Improper Disposal of Sensitive Data in Waste Facilities: Implementing Secure Shredding and Disposal Protocols

Comments
11 min read
Hackers don't have to be too smart unless you use this

Hackers don't have to be too smart unless you use this

Comments
3 min read
The Black Market for AI Agents: When Jailbreaking Becomes a Product

The Black Market for AI Agents: When Jailbreaking Becomes a Product

Comments
12 min read
Walking Into an Unknown Network: The First Thing I Check

Walking Into an Unknown Network: The First Thing I Check

1
Comments
3 min read
Day 16 — I Bypassed My Own Flask Login (And Fixed It Properly)

Day 16 — I Bypassed My Own Flask Login (And Fixed It Properly)

Comments
5 min read
“Meta-Security: Rethinking Trust, Incentives, and the Insider Threat”

“Meta-Security: Rethinking Trust, Incentives, and the Insider Threat”

Comments
3 min read
How Dependency Guardian Would Have Caught Shai-Hulud

How Dependency Guardian Would Have Caught Shai-Hulud

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.