DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

Comments
2 min read
Prompt Injection Is the “Social Engineering” of AI Apps

Prompt Injection Is the “Social Engineering” of AI Apps

1
Comments 1
2 min read
CVE-2026-26187: CVE-2026-26187: escaping the Lake with a Path Traversal Two-Step

CVE-2026-26187: CVE-2026-26187: escaping the Lake with a Path Traversal Two-Step

Comments
2 min read
Why Obfuscation Alone Does NOT Secure Your Mobile App

Why Obfuscation Alone Does NOT Secure Your Mobile App

Comments
2 min read
The OWASP Top 10 for LLMs — A Pentester's Practical Guide

The OWASP Top 10 for LLMs — A Pentester's Practical Guide

Comments
12 min read
I Built an Experimental Async OSINT Tool in Python (VoidScan)

I Built an Experimental Async OSINT Tool in Python (VoidScan)

Comments
1 min read
GHSA-XX7M-69FF-9CRP: SurrealDB's Poison Pill: Crashing the Database with a Single String

GHSA-XX7M-69FF-9CRP: SurrealDB's Poison Pill: Crashing the Database with a Single String

Comments
2 min read
What Is Runtime Authorization? A Guide to Dynamic Access Control and the Best Runtime Authorization Tools

What Is Runtime Authorization? A Guide to Dynamic Access Control and the Best Runtime Authorization Tools

5
Comments
5 min read
Building a SOC Assistant CLI with GitHub Copilot to Detect Real Attack Patterns

GitHub Copilot CLI Challenge Submission

Building a SOC Assistant CLI with GitHub Copilot to Detect Real Attack Patterns

1
Comments
3 min read
The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

1
Comments
5 min read
Offline vs Cloud: the Real Threat Model in Password Managers

Offline vs Cloud: the Real Threat Model in Password Managers

Comments
2 min read
CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

Comments
2 min read
CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

Comments
2 min read
👻 EDR Evasion: Unhooking the Kernel

👻 EDR Evasion: Unhooking the Kernel

Comments
6 min read
Hello World — Independent Security Researcher Joining DEV

Hello World — Independent Security Researcher Joining DEV

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.