DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38

🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38

18
Comments
11 min read
Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses

Adversarial AI: How Machine Learning Models Are Being Weaponized to Evade Your Security Defenses

4
Comments
13 min read
Automating Threat Intel: How I Built a Fast, Containerised IP Triage Tool

Automating Threat Intel: How I Built a Fast, Containerised IP Triage Tool

Comments
2 min read
Microsoft Cloud Adoption Framework

Microsoft Cloud Adoption Framework

Comments
1 min read
How we made email authentication actually usable inside editors and AI agents

How we made email authentication actually usable inside editors and AI agents

1
Comments
2 min read
What Kind of Customer Data Do Companies Capture?

What Kind of Customer Data Do Companies Capture?

Comments
5 min read
Instagram Data Breach: Unpacking the Exposure of 17.5 Million Users

Instagram Data Breach: Unpacking the Exposure of 17.5 Million Users

5
Comments 2
4 min read
Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Comments
3 min read
DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime

DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime

99
Comments 25
11 min read
Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Comments
3 min read
Identity Alone Fails in Autonomous Systems

Identity Alone Fails in Autonomous Systems

Comments
1 min read
Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself

Why Your Compliance Team Secretly Wants Sentinel: The Database That Audits Itself

2
Comments
9 min read
I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

Comments
2 min read
When Time Becomes a Security Boundary in AI Systems

When Time Becomes a Security Boundary in AI Systems

Comments
2 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.