DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
GHSA-V8W9-8MX6-G223: GHSA-v8w9-8mx6-g223: Prototype Pollution in Hono parseBody Utility

GHSA-V8W9-8MX6-G223: GHSA-v8w9-8mx6-g223: Prototype Pollution in Hono parseBody Utility

1
Comments
2 min read
I Logged 1 Million Requests to My Server — Here's What I Found

I Logged 1 Million Requests to My Server — Here's What I Found

Comments
3 min read
MP1 Write‑Up – Stack Smashing

MP1 Write‑Up – Stack Smashing

Comments
6 min read
1 in 4 SMBs Hacked Despite Security Measures: Key Findings from Proton's 2026 Report

1 in 4 SMBs Hacked Despite Security Measures: Key Findings from Proton's 2026 Report

Comments
2 min read
Cross-Site Scripting (XSS) Explained for Developers

Cross-Site Scripting (XSS) Explained for Developers

Comments
3 min read
The "Vibe Coding" Security Gap: 5 Things I Noticed in AI Apps Recently

The "Vibe Coding" Security Gap: 5 Things I Noticed in AI Apps Recently

Comments
3 min read
OWASP Top 10 Explained Simply — With Real Examples

OWASP Top 10 Explained Simply — With Real Examples

1
Comments
6 min read
SQL Injection – Blind SQL injection with conditional responses | PortSwigger Lab Note #8

SQL Injection – Blind SQL injection with conditional responses | PortSwigger Lab Note #8

Comments
1 min read
How AI Is Making Cyber Attacks Smarter in Cloud Environments

How AI Is Making Cyber Attacks Smarter in Cloud Environments

1
Comments
1 min read
Your AI Agent's Memory Can Be Poisoned — Here's How to Defend It

Your AI Agent's Memory Can Be Poisoned — Here's How to Defend It

1
Comments
7 min read
I Built a Honeypot That Profiles Attackers and Maps Their Behavior to MITRE ATT&CK

I Built a Honeypot That Profiles Attackers and Maps Their Behavior to MITRE ATT&CK

1
Comments
4 min read
The Advanced Cybersecurity Ego Taxonomy

The Advanced Cybersecurity Ego Taxonomy

2
Comments
3 min read
Agentic Cyber Threat Intelligence

Agentic Cyber Threat Intelligence

1
Comments
12 min read
Why Offline Encryption Still Matters on Android

Why Offline Encryption Still Matters on Android

1
Comments
3 min read
The MCP Attack Surface: 4 Threat Vectors Every AI Developer Misses

The MCP Attack Surface: 4 Threat Vectors Every AI Developer Misses

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.