DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
There's Always a Hardcoded Secret Somewhere — Meet Titus

There's Always a Hardcoded Secret Somewhere — Meet Titus

Comments
4 min read
Como Funciona Supply Chain Attack -PTBR

Como Funciona Supply Chain Attack -PTBR

1
Comments 2
6 min read
OSI Layer 3—The Navigator: Reachability, Direction, and Global Movement

OSI Layer 3—The Navigator: Reachability, Direction, and Global Movement

7
Comments 2
4 min read
CVE-2026-22782: RustFS Leak: When Error Logs Become Credentials

CVE-2026-22782: RustFS Leak: When Error Logs Become Credentials

Comments
2 min read
Your Java Regex Can Be Weaponized (And How To Stop It)

Your Java Regex Can Be Weaponized (And How To Stop It)

1
Comments
3 min read
Your Java Regex Can Be Weaponized (And How To Stop It)

Your Java Regex Can Be Weaponized (And How To Stop It)

Comments
3 min read
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

1
Comments
6 min read
GHSA-GW32-9RMW-QWWW: Svelte SSR XSS: The Textarea Trap

GHSA-GW32-9RMW-QWWW: Svelte SSR XSS: The Textarea Trap

Comments
2 min read
GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

Comments
2 min read
Safeinstall: Um aliado no combate a ataques de Supply chain

Safeinstall: Um aliado no combate a ataques de Supply chain

3
Comments
6 min read
Uqda Network vs Regular Internet: A Real-World Comparison 📊

Uqda Network vs Regular Internet: A Real-World Comparison 📊

1
Comments
7 min read
Week 6 OAuth2 Conceptual Quiz

Week 6 OAuth2 Conceptual Quiz

1
Comments
10 min read
Uqda Network: Building a Private Internet Where Privacy is the Default 🌐🔒

Uqda Network: Building a Private Internet Where Privacy is the Default 🌐🔒

1
Comments
8 min read
Fintech Transaction Monitoring & Fraud Detection Using Splunk

Fintech Transaction Monitoring & Fraud Detection Using Splunk

6
Comments
2 min read
How Supply Chain Attacks Work

How Supply Chain Attacks Work

2
Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.