DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Obfuscation Alone Does NOT Secure Your Mobile App

Why Obfuscation Alone Does NOT Secure Your Mobile App

Comments
2 min read
I Built an Experimental Async OSINT Tool in Python (VoidScan)

I Built an Experimental Async OSINT Tool in Python (VoidScan)

Comments
1 min read
Identification of cyber threats using Big Data architectures

Identification of cyber threats using Big Data architectures

Comments
2 min read
GHSA-XX7M-69FF-9CRP: SurrealDB's Poison Pill: Crashing the Database with a Single String

GHSA-XX7M-69FF-9CRP: SurrealDB's Poison Pill: Crashing the Database with a Single String

Comments
2 min read
What Is Runtime Authorization? A Guide to Dynamic Access Control and the Best Runtime Authorization Tools

What Is Runtime Authorization? A Guide to Dynamic Access Control and the Best Runtime Authorization Tools

5
Comments
5 min read
The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

1
Comments
5 min read
They Promised 100x..... Then Vanished

They Promised 100x..... Then Vanished

2
Comments
3 min read
CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

Comments
2 min read
CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

Comments
2 min read
đź‘» EDR Evasion: Unhooking the Kernel

đź‘» EDR Evasion: Unhooking the Kernel

Comments
6 min read
From DAN to AutoDAN-Turbo: The Wild Evolution of AI Jailbreaking 🚀

From DAN to AutoDAN-Turbo: The Wild Evolution of AI Jailbreaking 🚀

6
Comments
3 min read
Hello World — Independent Security Researcher Joining DEV

Hello World — Independent Security Researcher Joining DEV

Comments
1 min read
Secure by Design — Building Fortresses, Not Just Fixing Leaks

Secure by Design — Building Fortresses, Not Just Fixing Leaks

1
Comments
3 min read
Windows 11 Recall: The $2M Privacy Liability Every CTO Must Audit

Windows 11 Recall: The $2M Privacy Liability Every CTO Must Audit

Comments
5 min read
GHSA-435G-FCV3-8J26: High Assurance, Low Availability: The Libcrux Triple Threat

GHSA-435G-FCV3-8J26: High Assurance, Low Availability: The Libcrux Triple Threat

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.