DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

1
Comments
5 min read
LeakScope: Supabase Security Scanner That Finds Leaks in Seconds

LeakScope: Supabase Security Scanner That Finds Leaks in Seconds

1
Comments
2 min read
The most practical, fast, tiny command sandboxing for AI agents

The most practical, fast, tiny command sandboxing for AI agents

1
Comments 1
4 min read
Vector Database Breaches: How Embeddings Expose Your Sensitive Data

Vector Database Breaches: How Embeddings Expose Your Sensitive Data

1
Comments
5 min read
Model Theft: How Attackers Steal Your Fine-Tuned AI Models Through API Extraction

Model Theft: How Attackers Steal Your Fine-Tuned AI Models Through API Extraction

Comments
10 min read
Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval

Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval

Comments
4 min read
The Hidden Problem with Embedded Chat Widgets (and How Iframes Fix It)

The Hidden Problem with Embedded Chat Widgets (and How Iframes Fix It)

Comments
9 min read
Zero-Trust Architecture in Practice: Why Perimeter Security Failed and What Actually Works

Zero-Trust Architecture in Practice: Why Perimeter Security Failed and What Actually Works

1
Comments
11 min read
CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

Comments
2 min read
Industrial Robot Security: How Autonomous Systems Become Weapons in the Supply Chain

Industrial Robot Security: How Autonomous Systems Become Weapons in the Supply Chain

1
Comments
11 min read
Supply Chain Attacks: How Compromised Dependencies Weaponize Your Entire AI Infrastructure

Supply Chain Attacks: How Compromised Dependencies Weaponize Your Entire AI Infrastructure

Comments
11 min read
Cascading Grid Failures: How Adversaries Weaponize RTOs and Demand Response

Cascading Grid Failures: How Adversaries Weaponize RTOs and Demand Response

Comments
8 min read
Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Comments
5 min read
đź‘» EDR Evasion: Unhooking the Kernel

đź‘» EDR Evasion: Unhooking the Kernel

Comments
6 min read
CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.