DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Linux Root Exploit (CVE-2026-31431), SAP npm Supply Chain Attack, & Homelab Secrets with Infisical

Linux Root Exploit (CVE-2026-31431), SAP npm Supply Chain Attack, & Homelab Secrets with Infisical

Comments
2 min read
Week 3 – Learning Linux the Right Way

Week 3 – Learning Linux the Right Way

Comments
1 min read
Day 3 Learning How Data Actually Moves (TCP/IP, TCP vs UDP, DHCP)

Day 3 Learning How Data Actually Moves (TCP/IP, TCP vs UDP, DHCP)

Comments
1 min read
60–80% of your CVEs are unreachable. Here's how to prove it.

60–80% of your CVEs are unreachable. Here's how to prove it.

1
Comments
4 min read
Why Traditional Security Testing Misses 70% of AI Attack Surface

Why Traditional Security Testing Misses 70% of AI Attack Surface

Comments
12 min read
OverTheWire: Bandit Level 1

OverTheWire: Bandit Level 1

5
Comments
1 min read
AI Agents Authentication: How Autonomous Systems Prove Identity

AI Agents Authentication: How Autonomous Systems Prove Identity

1
Comments
17 min read
Detecting and Neutralizing a Brute-Force Attack: A Hands-On Lab with Splunk, Hydra, and UFW

Detecting and Neutralizing a Brute-Force Attack: A Hands-On Lab with Splunk, Hydra, and UFW

Comments
2 min read
Why Scam Campaigns Should Be Understood from Contact to Loss

Why Scam Campaigns Should Be Understood from Contact to Loss

Comments
6 min read
RF Intelligence: The Attack Surface Your SIEM Can't See

RF Intelligence: The Attack Surface Your SIEM Can't See

Comments
4 min read
Building ProShield-AI: How MongoDB Atlas Powers a Real-Time Cybersecurity Platform

Building ProShield-AI: How MongoDB Atlas Powers a Real-Time Cybersecurity Platform

1
Comments
4 min read
How I Built a Real-Time DDoS Detection Engine That Learns What Normal Looks Like

How I Built a Real-Time DDoS Detection Engine That Learns What Normal Looks Like

Comments
2 min read
Building a DDoS Detection Tool

Building a DDoS Detection Tool

Comments
9 min read
How I Built a DDoS Detection Tool From Scratch Using Go

How I Built a DDoS Detection Tool From Scratch Using Go

1
Comments
7 min read
CVE-2026-3854: What GitHub's Git Push RCE Teaches Developers About Trust Boundaries

CVE-2026-3854: What GitHub's Git Push RCE Teaches Developers About Trust Boundaries

Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.