DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Pen Testing IoT Devices

Pen Testing IoT Devices

Comments
8 min read
AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments

AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments

25
Comments
8 min read
Understanding Encryption in LoRa & Meshtastic Networks

Understanding Encryption in LoRa & Meshtastic Networks

Comments
2 min read
Meshtastic Security: A Realistic Threat Model for Off-Grid Networks

Meshtastic Security: A Realistic Threat Model for Off-Grid Networks

Comments
2 min read
CVE-2025-5419 - Google Chrome V8 Engine Out-of-Bounds Read/Write Vulnerability

CVE-2025-5419 - Google Chrome V8 Engine Out-of-Bounds Read/Write Vulnerability

Comments
9 min read
Stop Being a Script Kiddie: building a Port Scanner with Python 🐍

Stop Being a Script Kiddie: building a Port Scanner with Python 🐍

Comments
3 min read
AWS SERVICES SPOTLIGHT : CLOUDHSM (HARDWARD SECURITY MODULE)

AWS SERVICES SPOTLIGHT : CLOUDHSM (HARDWARD SECURITY MODULE)

Comments
1 min read
CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

1
Comments
2 min read
Understanding the Latest OWASP Top 10 2025 Changes

Understanding the Latest OWASP Top 10 2025 Changes

1
Comments
4 min read
OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

6
Comments
4 min read
Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Comments
4 min read
Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes

Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes

Comments
12 min read
The Epistemology of Offense and Defense: A Foundational Framework

The Epistemology of Offense and Defense: A Foundational Framework

Comments
6 min read
Endpoint Detection & Response (EDR)

Endpoint Detection & Response (EDR)

Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.