DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

1
Comments
12 min read
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

1
Comments
6 min read
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

1
Comments 1
7 min read
Hackers Rob. Security Reads the Manual.

Hackers Rob. Security Reads the Manual.

Comments
3 min read
SafeLine v9.3.0: Evolving a Semantic Analysis WAF for Modern Web Security

SafeLine v9.3.0: Evolving a Semantic Analysis WAF for Modern Web Security

Comments
3 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
No Complex Regular Expressions Required: The New SLS Data Masking Function Makes Privacy Protection Simpler and More Efficient

No Complex Regular Expressions Required: The New SLS Data Masking Function Makes Privacy Protection Simpler and More Efficient

Comments
7 min read
Two Critical n8n Vulnerabilities: Sandbox Escapes Leading to Full Remote Code Execution

Two Critical n8n Vulnerabilities: Sandbox Escapes Leading to Full Remote Code Execution

Comments
4 min read
Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

1
Comments
7 min read
Browser Fingerprinting: How Websites Track You Even With a VPN (And How to Stop It)

Browser Fingerprinting: How Websites Track You Even With a VPN (And How to Stop It)

3
Comments
3 min read
Building CryptoVault: A Professional File Encryption Tool for Linux

Building CryptoVault: A Professional File Encryption Tool for Linux

1
Comments
1 min read
GPT-OSS Safeguard: What It Actually Does (And Common Mistakes to Avoid)

GPT-OSS Safeguard: What It Actually Does (And Common Mistakes to Avoid)

2
Comments
11 min read
When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Why Semantic Analysis Is the Only Sustainable WAF Strategy Going Forward

Why Semantic Analysis Is the Only Sustainable WAF Strategy Going Forward

Comments
3 min read
Beyond Backups: Building Verifiable Cloud Recovery on IBM Cloud

Beyond Backups: Building Verifiable Cloud Recovery on IBM Cloud

1
Comments 1
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.