DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Comments
4 min read
Security Through Obscurity

Security Through Obscurity

Comments
3 min read
How to Automate Security Audits with AI: A Complete Guide for DevOps Teams

How to Automate Security Audits with AI: A Complete Guide for DevOps Teams

Comments
5 min read
Secure by Design — Building Fortresses, Not Just Fixing Leaks

Secure by Design — Building Fortresses, Not Just Fixing Leaks

Comments
3 min read
WinHttpOpen user agents

WinHttpOpen user agents

Comments
1 min read
1 little known secret of CompatTelRunner.exe

1 little known secret of CompatTelRunner.exe

Comments
1 min read
From DAN to AutoDAN-Turbo: The Wild Evolution of AI Jailbreaking 🚀

From DAN to AutoDAN-Turbo: The Wild Evolution of AI Jailbreaking 🚀

6
Comments
3 min read
Why AI-Powered IPS Systems Fail and How I Reduced False Positives by 96% Without Blocking Traffic

Why AI-Powered IPS Systems Fail and How I Reduced False Positives by 96% Without Blocking Traffic

Comments
3 min read
The Security Masterplan — Synthesizing the Pillars of Digital Resilience

The Security Masterplan — Synthesizing the Pillars of Digital Resilience

Comments
3 min read
Separation of Duties — The Power of Checks and Balances in Cybersecurity

Separation of Duties — The Power of Checks and Balances in Cybersecurity

Comments
3 min read
V-Cyber: The Operating System AI Agents Were Waiting For

V-Cyber: The Operating System AI Agents Were Waiting For

Comments
4 min read
The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report

The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report

Comments
3 min read
X.509 Beyond Trust: Weaponizing Certificate Extensibility Without Breaking TLS

X.509 Beyond Trust: Weaponizing Certificate Extensibility Without Breaking TLS

Comments
2 min read
🎯 Hunting In-Memory Shellcode Evasion

🎯 Hunting In-Memory Shellcode Evasion

Comments
5 min read
Multi-Vector Attack Convergence: Outlook, Zero-Days & AI Malware

Multi-Vector Attack Convergence: Outlook, Zero-Days & AI Malware

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.