DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to practice Security Code Reviews

How to practice Security Code Reviews

1
Comments
2 min read
Pen Testing IoT Devices

Pen Testing IoT Devices

Comments
8 min read
AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments

AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments

18
Comments
8 min read
Understanding Encryption in LoRa & Meshtastic Networks

Understanding Encryption in LoRa & Meshtastic Networks

Comments
2 min read
Meshtastic Security: A Realistic Threat Model for Off-Grid Networks

Meshtastic Security: A Realistic Threat Model for Off-Grid Networks

Comments
2 min read
Stop Being a Script Kiddie: building a Port Scanner with Python 🐍

Stop Being a Script Kiddie: building a Port Scanner with Python 🐍

Comments
3 min read
AWS SERVICES SPOTLIGHT : CLOUDHSM (HARDWARD SECURITY MODULE)

AWS SERVICES SPOTLIGHT : CLOUDHSM (HARDWARD SECURITY MODULE)

Comments
1 min read
CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

1
Comments
2 min read
Understanding the Latest OWASP Top 10 2025 Changes

Understanding the Latest OWASP Top 10 2025 Changes

1
Comments
4 min read
I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

6
Comments
4 min read
Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes

Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes

Comments
12 min read
Endpoint Detection & Response (EDR)

Endpoint Detection & Response (EDR)

Comments
6 min read
Explorando el paralelismo real: Python 3.14 (No-GIL) y Rust

Explorando el paralelismo real: Python 3.14 (No-GIL) y Rust

Comments
11 min read
AI-SPM Explained: How to Secure AI Agents

AI-SPM Explained: How to Secure AI Agents

5
Comments
4 min read
From Regex Matching to Understanding Intent: How SafeLine WAF Uses Semantic Analysis

From Regex Matching to Understanding Intent: How SafeLine WAF Uses Semantic Analysis

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.