DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
eJPT Lab Walkthrough: Vulnerability Assessment

eJPT Lab Walkthrough: Vulnerability Assessment

Comments
3 min read
Day 9 — Secret-Scout : Building a Secrets Detection Tool for Secure Codebases

Day 9 — Secret-Scout : Building a Secrets Detection Tool for Secure Codebases

Comments
5 min read
CVE-2026-0994: Recursive Hell: Breaking Python Protobuf with Nested 'Any' Messages

CVE-2026-0994: Recursive Hell: Breaking Python Protobuf with Nested 'Any' Messages

2
Comments
2 min read
Most API Breaches Don’t Hack You, They Walk In

Most API Breaches Don’t Hack You, They Walk In

Comments
2 min read
Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask

Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask

3
Comments
6 min read
The Untouchable Hacker God: Deciphering Finland's Biggest Cybercrime

The Untouchable Hacker God: Deciphering Finland's Biggest Cybercrime

5
Comments
4 min read
If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

1
Comments
3 min read
Weekly #03-2026: React2Shell Zero-Day Defense, Kubernetes Autoscaling Guide, AI Coding Guardrails & 2026 AI Acceleration

Weekly #03-2026: React2Shell Zero-Day Defense, Kubernetes Autoscaling Guide, AI Coding Guardrails & 2026 AI Acceleration

1
Comments
4 min read
The AI Attack You Can't See: Understanding Prompt Injection Risks

The AI Attack You Can't See: Understanding Prompt Injection Risks

Comments
2 min read
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

6
Comments 2
13 min read
The AI Arms Race: Why Mobile Brands Must Lead the Charge in Cybersecurity

The AI Arms Race: Why Mobile Brands Must Lead the Charge in Cybersecurity

1
Comments
4 min read
How to DoS A server

How to DoS A server

Comments
4 min read
GHSA-38CW-85XC-XR9X: Identity Crisis: Dumping Veramo's Digital Wallets via SQL Injection

GHSA-38CW-85XC-XR9X: Identity Crisis: Dumping Veramo's Digital Wallets via SQL Injection

Comments
2 min read
CVE-2026-23735: Singleton Roulette: Racing for Context in GraphQL Modules

CVE-2026-23735: Singleton Roulette: Racing for Context in GraphQL Modules

Comments
2 min read
There's Always a Hardcoded Secret Somewhere — Meet Titus

There's Always a Hardcoded Secret Somewhere — Meet Titus

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.