DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The ServiceNow AI Vulnerability: What Went Wrong and How to Secure Your AI Agents

The ServiceNow AI Vulnerability: What Went Wrong and How to Secure Your AI Agents

Comments 1
6 min read
One-Pixel Attacks: Why Computer Vision Security Is Broken

One-Pixel Attacks: Why Computer Vision Security Is Broken

2
Comments
6 min read
B2B Payments: Best Practices to Secure Payment Processing

B2B Payments: Best Practices to Secure Payment Processing

10
Comments
9 min read
SSL/TLS & Encryption: Symmetric vs Asymmetric keys, Certificate Authorities, Mutual TLS (mTLS)

SSL/TLS & Encryption: Symmetric vs Asymmetric keys, Certificate Authorities, Mutual TLS (mTLS)

Comments
5 min read
Getting Started with Bug Bounties: Core Vulnerabilities and Basic Testing

Getting Started with Bug Bounties: Core Vulnerabilities and Basic Testing

7
Comments
4 min read
Identification of cyber threats using Big Data architectures

Identification of cyber threats using Big Data architectures

1
Comments
2 min read
AI Phishing Defense Platform Day 14

AI Phishing Defense Platform Day 14

Comments 5
1 min read
Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Comments
4 min read
🧭 Dominando el OWASP Top 10 (Edición 2025): El Plano de Seguridad para la Próxima Generación

🧭 Dominando el OWASP Top 10 (Edición 2025): El Plano de Seguridad para la Próxima Generación

Comments
4 min read
From Header Bidding Chaos to Control: How One Publisher Secured Their Ad Stack with SafeLine WAF

From Header Bidding Chaos to Control: How One Publisher Secured Their Ad Stack with SafeLine WAF

Comments
3 min read
The Goldman-JPMorgan Breaches Prove Enterprise Security Is Built on a Lie

The Goldman-JPMorgan Breaches Prove Enterprise Security Is Built on a Lie

Comments
6 min read
Day 3 — Building a Computer That Keeps Evidence

Day 3 — Building a Computer That Keeps Evidence

4
Comments
4 min read
How to Automate Security Audits with AI: A Complete Guide for DevOps Teams

How to Automate Security Audits with AI: A Complete Guide for DevOps Teams

Comments
5 min read
CrowdStrike Acquires Browser Security Firm Seraphic for $420 Million

CrowdStrike Acquires Browser Security Firm Seraphic for $420 Million

Comments
2 min read
The ServiceNow Vulnerability Reveals Why Enterprise AI Is a Security Time Bomb

The ServiceNow Vulnerability Reveals Why Enterprise AI Is a Security Time Bomb

Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.