DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AI is changing how we build software: here's how to do it safely

AI is changing how we build software: here's how to do it safely

Comments
6 min read
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

7
Comments 5
4 min read
Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)

Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)

Comments
2 min read
Day 1 — Back to Scratch: Relearning Python Without Autopilot

Day 1 — Back to Scratch: Relearning Python Without Autopilot

5
Comments
2 min read
Prompt Injection Is the “Social Engineering” of AI Apps

Prompt Injection Is the “Social Engineering” of AI Apps

1
Comments 1
2 min read
🔍 Beginner’s Guide to Nmap: Understanding Network Scanning for Cybersecurity

🔍 Beginner’s Guide to Nmap: Understanding Network Scanning for Cybersecurity

Comments
2 min read
Vens: Stop Patching Vulnerabilities That Don't Matter to You

Vens: Stop Patching Vulnerabilities That Don't Matter to You

1
Comments 1
2 min read
How to Enable MAC Address Randomisation in Linux Desktop

How to Enable MAC Address Randomisation in Linux Desktop

Comments
2 min read
I Turned an EXE Into Music (and it actually tells you something)

I Turned an EXE Into Music (and it actually tells you something)

Comments
4 min read
Offline vs Cloud: the Real Threat Model in Password Managers

Offline vs Cloud: the Real Threat Model in Password Managers

1
Comments
2 min read
Building a SOC Assistant CLI with GitHub Copilot to Detect Real Attack Patterns

GitHub Copilot CLI Challenge Submission

Building a SOC Assistant CLI with GitHub Copilot to Detect Real Attack Patterns

4
Comments
3 min read
The OWASP Top 10 for LLMs — A Pentester's Practical Guide

The OWASP Top 10 for LLMs — A Pentester's Practical Guide

Comments
12 min read
🧠 TEE Attestation Isn’t Trust It’s Just a Receipt

🧠 TEE Attestation Isn’t Trust It’s Just a Receipt

3
Comments 3
3 min read
The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

1
Comments
5 min read
Windows 11 Recall: The $2M Privacy Liability Every CTO Must Audit

Windows 11 Recall: The $2M Privacy Liability Every CTO Must Audit

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.