DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
All It Took Was npm install (Axios Attack)

All It Took Was npm install (Axios Attack)

1
Comments
4 min read
Sherlock for Digital Forensics & Reconnaissance (OSINT Guide)

Sherlock for Digital Forensics & Reconnaissance (OSINT Guide)

Comments
1 min read
Building Secure AI Systems from Design to Deployment

Building Secure AI Systems from Design to Deployment

1
Comments 1
2 min read
Cross-Site Scripting (XSS) Prevention

Cross-Site Scripting (XSS) Prevention

Comments
1 min read
Three Months with SafeLine WAF: Why It Claims “No Rules Needed” for Injection Defense

Three Months with SafeLine WAF: Why It Claims “No Rules Needed” for Injection Defense

Comments
3 min read
The 8 CISSP Security Domains You Probably Don’t Think About — But Should

The 8 CISSP Security Domains You Probably Don’t Think About — But Should

Comments
4 min read
Week 7

Week 7

Comments
2 min read
I Built a Fully Local OSINT Agent with Ollama, LangChain, Telegram and Qwen3.5 14B — Running 24/7 on My Homelab, Zero Cloud, Zero Compromises

I Built a Fully Local OSINT Agent with Ollama, LangChain, Telegram and Qwen3.5 14B — Running 24/7 on My Homelab, Zero Cloud, Zero Compromises

Comments
6 min read
Week 6

Week 6

Comments
2 min read
ISO 27001 Internal Audit Checklist for Small Teams

ISO 27001 Internal Audit Checklist for Small Teams

1
Comments 1
7 min read
How I Built a Simple Link Security Checker (Beginner Project)🛡️

How I Built a Simple Link Security Checker (Beginner Project)🛡️

Comments
2 min read
🚀 I Built an Ethical Hacking Scanner Tool – Open Source Project

🚀 I Built an Ethical Hacking Scanner Tool – Open Source Project

Comments 3
1 min read
Actively Exploited Adobe CVE, Supply Chain Malware, & Self-hosted Certs

Actively Exploited Adobe CVE, Supply Chain Malware, & Self-hosted Certs

Comments
3 min read
Why Real-Time Prompt Filtering Is Critical for AI Data Security in 2026

Why Real-Time Prompt Filtering Is Critical for AI Data Security in 2026

1
Comments
7 min read
Mythos: The AI Anthropic Built and Won't Let You Use

Mythos: The AI Anthropic Built and Won't Let You Use

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.