DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Trace Whether Your .NET `HttpClient` Calls Are Quantum-Safe (PQC) 🚦

Trace Whether Your .NET `HttpClient` Calls Are Quantum-Safe (PQC) 🚦

Comments
5 min read
The ServiceNow AI Vulnerability: What Went Wrong and How to Secure Your AI Agents

The ServiceNow AI Vulnerability: What Went Wrong and How to Secure Your AI Agents

Comments 1
6 min read
One-Pixel Attacks: Why Computer Vision Security Is Broken

One-Pixel Attacks: Why Computer Vision Security Is Broken

2
Comments
6 min read
SSL/TLS & Encryption: Symmetric vs Asymmetric keys, Certificate Authorities, Mutual TLS (mTLS)

SSL/TLS & Encryption: Symmetric vs Asymmetric keys, Certificate Authorities, Mutual TLS (mTLS)

Comments
5 min read
Getting Started with Bug Bounties: Core Vulnerabilities and Basic Testing

Getting Started with Bug Bounties: Core Vulnerabilities and Basic Testing

7
Comments
4 min read
Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Comments
4 min read
đź§­ Dominando el OWASP Top 10 (EdiciĂłn 2025): El Plano de Seguridad para la PrĂłxima GeneraciĂłn

đź§­ Dominando el OWASP Top 10 (EdiciĂłn 2025): El Plano de Seguridad para la PrĂłxima GeneraciĂłn

Comments
4 min read
Day 3 — Building a Computer That Keeps Evidence

Day 3 — Building a Computer That Keeps Evidence

4
Comments
4 min read
How to Automate Security Audits with AI: A Complete Guide for DevOps Teams

How to Automate Security Audits with AI: A Complete Guide for DevOps Teams

Comments
5 min read
CrowdStrike Acquires Browser Security Firm Seraphic for $420 Million

CrowdStrike Acquires Browser Security Firm Seraphic for $420 Million

Comments
2 min read
The ServiceNow Vulnerability Reveals Why Enterprise AI Is a Security Time Bomb

The ServiceNow Vulnerability Reveals Why Enterprise AI Is a Security Time Bomb

Comments
7 min read
Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

Comments
2 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Comments
1 min read
Day 4 — I Built a Program That Caught a Reverse Shell

Day 4 — I Built a Program That Caught a Reverse Shell

Comments
3 min read
Healthcare Ransomware Victims Deserve Sympathy, Not a Free Pass

Healthcare Ransomware Victims Deserve Sympathy, Not a Free Pass

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.