DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Let's Poison Your LLM Application: A Security Wake-Up Call

Let's Poison Your LLM Application: A Security Wake-Up Call

16
Comments
9 min read
LLM Prompt Injection: Risks, Real Attacks, and Enterprise-Grade Defenses

LLM Prompt Injection: Risks, Real Attacks, and Enterprise-Grade Defenses

Comments
7 min read
Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

6
Comments 1
5 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
How Teaching Cybersecurity Changed the Way I See Hackers

How Teaching Cybersecurity Changed the Way I See Hackers

Comments
2 min read
Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

1
Comments
3 min read
Things You Must Know About Cybersecurity in the Cloud

Things You Must Know About Cybersecurity in the Cloud

1
Comments
5 min read
Secure by Design in the Age of GenAI: How Devs Must Shift Their Software Security Practices in 2025

Secure by Design in the Age of GenAI: How Devs Must Shift Their Software Security Practices in 2025

Comments 4
3 min read
How NAT Works: A Simple Guide to Network Address Translation

How NAT Works: A Simple Guide to Network Address Translation

Comments
4 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
Is Your Website Hacked by “admnlxgxn”? Here’s How to Spot It and Clean It Up

Is Your Website Hacked by “admnlxgxn”? Here’s How to Spot It and Clean It Up

Comments
5 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

Comments
3 min read
The Cyber Warrior Handbook — A Practical, FREE Entry-Level Offensive Security Training Online

The Cyber Warrior Handbook — A Practical, FREE Entry-Level Offensive Security Training Online

Comments
2 min read
Hybrid Infrastructure: Why Businesses Combine Cloud and Physical Servers

Hybrid Infrastructure: Why Businesses Combine Cloud and Physical Servers

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.