DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Complete MITRE ATT&CK MCP Server

Complete MITRE ATT&CK MCP Server

Comments
5 min read
Why Your Airline’s Chatbot is a Security Risk (and How to Fix It)

Why Your Airline’s Chatbot is a Security Risk (and How to Fix It)

5
Comments
3 min read
LLM Security Alert: 91,000+ Attacks Probing Enterprise AI Endpoints (And How to Stop Them)

LLM Security Alert: 91,000+ Attacks Probing Enterprise AI Endpoints (And How to Stop Them)

5
Comments
5 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

1
Comments
1 min read
The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers

The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers

Comments
6 min read
LanManVan: My Journey Building a Modular Security Framework in Go

LanManVan: My Journey Building a Modular Security Framework in Go

5
Comments
2 min read
I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

Comments
6 min read
When Data Breaches Become Loyalty Programs: How $1.17 Billion in Vouchers Broke the Security Incentive Model

When Data Breaches Become Loyalty Programs: How $1.17 Billion in Vouchers Broke the Security Incentive Model

Comments
6 min read
How to Set Up Your First IAM User in 5 Minutes on AWS

How to Set Up Your First IAM User in 5 Minutes on AWS

Comments
2 min read
I built a Python tool to hunt down Remote Access Trojans on Windows

I built a Python tool to hunt down Remote Access Trojans on Windows

Comments
1 min read
7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

3
Comments
9 min read
Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

6
Comments
4 min read
I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

Comments
1 min read
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

1
Comments
6 min read
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

1
Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.