DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Day 26: The Pentester's Playbook — Strategy, Keys, and Smart Pivoting 🕵️‍♂️

Day 26: The Pentester's Playbook — Strategy, Keys, and Smart Pivoting 🕵️‍♂️

Comments
2 min read
How 734+ Cybersecurity Skills Make AI Agents Stop Hallucinating Security Procedures

How 734+ Cybersecurity Skills Make AI Agents Stop Hallucinating Security Procedures

1
Comments
6 min read
I Upgraded My Pentesting Toolkit: Introducing 2 Free Web Tools for Infosec 🛡️

I Upgraded My Pentesting Toolkit: Introducing 2 Free Web Tools for Infosec 🛡️

1
Comments
2 min read
How to audit your AWS infrastructure for NIS2 and DORA compliance (practical guide)

How to audit your AWS infrastructure for NIS2 and DORA compliance (practical guide)

Comments
4 min read
BlueLeaks 2.0 Exposes Crime Stoppers Tipsters: Anonymity Compromised, Urgent Solutions Needed

BlueLeaks 2.0 Exposes Crime Stoppers Tipsters: Anonymity Compromised, Urgent Solutions Needed

Comments
14 min read
Cross-site scripting – Stored XSS into anchor href attribute with double quotes HTML-encoded | PortSwigger Lab Note #2

Cross-site scripting – Stored XSS into anchor href attribute with double quotes HTML-encoded | PortSwigger Lab Note #2

Comments
1 min read
Day 25: Network Pivoting — Breaking Into the Internal LAN 🕵️‍♂️

Day 25: Network Pivoting — Breaking Into the Internal LAN 🕵️‍♂️

Comments
1 min read
When Runtime Controls Fail, Substrate Governance Must Hold

When Runtime Controls Fail, Substrate Governance Must Hold

3
Comments
2 min read
What is ModSecurity and How It Works

What is ModSecurity and How It Works

Comments
3 min read
MediaTek Audio DSP Vulnerability: How a Nothing Phone Could Have Been Hacked (Except It Wasn't)

MediaTek Audio DSP Vulnerability: How a Nothing Phone Could Have Been Hacked (Except It Wasn't)

Comments
7 min read
Patch Tuesday Zero-Day Lessons: What February 2024's Two Exploited Flaws Still Teach Us [2026]

Patch Tuesday Zero-Day Lessons: What February 2024's Two Exploited Flaws Still Teach Us [2026]

Comments
6 min read
Chrome Zero-Day Exploits: 4 Vulnerabilities Exposed in May 2024's Most Aggressive Attack Wave

Chrome Zero-Day Exploits: 4 Vulnerabilities Exposed in May 2024's Most Aggressive Attack Wave

Comments
7 min read
Why Multi-Factor Authentication Won't Stop Social Engineering Attacks

Why Multi-Factor Authentication Won't Stop Social Engineering Attacks

Comments
5 min read
CVE-2026-33017: How I Found an Unauthenticated RCE in Langflow by Reading the Code They Already Fixed

CVE-2026-33017: How I Found an Unauthenticated RCE in Langflow by Reading the Code They Already Fixed

3
Comments
7 min read
Day 24: Post-Exploitation Mastery — What Happens After Root? 🕵️‍♂️

Day 24: Post-Exploitation Mastery — What Happens After Root? 🕵️‍♂️

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.