DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Vertical BOLA in APIs

Understanding Vertical BOLA in APIs

1
Comments
3 min read
SQL Injection – UNION attack, retrieving data from other tables | PortSwigger Lab Note #4

SQL Injection – UNION attack, retrieving data from other tables | PortSwigger Lab Note #4

5
Comments
1 min read
SQL Injection – UNION attack | PortSwigger Lab Note #3

SQL Injection – UNION attack | PortSwigger Lab Note #3

5
Comments
1 min read
CVE-2026-1778: The Global Unverify: How One Line of Python Broke SageMaker TLS

CVE-2026-1778: The Global Unverify: How One Line of Python Broke SageMaker TLS

Comments
2 min read
Deploying My Headless Ubuntu Server

Deploying My Headless Ubuntu Server

4
Comments
2 min read
Zero-Touch Secrets: On-The-Wire Injection of Vault-Sourced Credentials

Zero-Touch Secrets: On-The-Wire Injection of Vault-Sourced Credentials

Comments
7 min read
Protocols Visualizer: An Interactive Way to Learn Network Protocols

Protocols Visualizer: An Interactive Way to Learn Network Protocols

7
Comments
1 min read
Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

6
Comments 1
3 min read
MIME Sniffing — the API issue nobody notices until it bites

MIME Sniffing — the API issue nobody notices until it bites

1
Comments
1 min read
The Overlooked Attack Surface in Enterprise RAG Systems

The Overlooked Attack Surface in Enterprise RAG Systems

Comments
2 min read
The Cybersecurity Ego Taxonomy

The Cybersecurity Ego Taxonomy

19
Comments 4
2 min read
When light becomes a weapon: laser-based command injection attacks on voice assistants

When light becomes a weapon: laser-based command injection attacks on voice assistants

1
Comments
2 min read
Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants

Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants

Comments
2 min read
Exploring Emoji-Based Prompt Manipulation in LLMs

Exploring Emoji-Based Prompt Manipulation in LLMs

Comments
1 min read
How Browser Fingerprinting Works

How Browser Fingerprinting Works

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.