DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security Incident Report: Cryptominer Attack on Next.js Application

Security Incident Report: Cryptominer Attack on Next.js Application

Comments
6 min read
The right tool for the job

The right tool for the job

Comments
2 min read
Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Comments
3 min read
🖼️ ExifPlus: Why Metadata Matters in Bug Bounty Testing & How to Protect Your App from Hidden Image Data

🖼️ ExifPlus: Why Metadata Matters in Bug Bounty Testing & How to Protect Your App from Hidden Image Data

Comments
3 min read
Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Comments
3 min read
Why Your UEBA Isn’t Working (and how to fix it)

Why Your UEBA Isn’t Working (and how to fix it)

1
Comments
7 min read
Identity Alone Fails in Autonomous Systems

Identity Alone Fails in Autonomous Systems

Comments
1 min read
🚨 Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)

🚨 Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)

Comments
1 min read
I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

Comments
2 min read
🕵️‍♀️ Nmap & Scapy on Kali: A Beginner-Friendly Packet Adventure

🕵️‍♀️ Nmap & Scapy on Kali: A Beginner-Friendly Packet Adventure

Comments
16 min read
6 Top WordPress Security Plugins to Use in 2026

6 Top WordPress Security Plugins to Use in 2026

Comments
5 min read
Understanding JSON Web Tokens (JWT) for Secure Information Sharing

Understanding JSON Web Tokens (JWT) for Secure Information Sharing

Comments
4 min read
How Cutting-Edge Technology Shapes Today’s Crypto Trading Platforms

How Cutting-Edge Technology Shapes Today’s Crypto Trading Platforms

Comments
5 min read
Tutorial SQL Injection: Panduan Lengkap untuk Pemula

Tutorial SQL Injection: Panduan Lengkap untuk Pemula

Comments
11 min read
🫡 Introducing Nikki: Your Offline, Uncensored AI Red Team Assistant in the Terminal

🫡 Introducing Nikki: Your Offline, Uncensored AI Red Team Assistant in the Terminal

2
Comments
3 min read
Be the Developer Who’s Ahead of Their Time: Meet pipq, Your New Superpower for Secure Python Development

Be the Developer Who’s Ahead of Their Time: Meet pipq, Your New Superpower for Secure Python Development

Comments
4 min read
What I Learned While Investigating Industrial Security Across Solar and BESS Sites

What I Learned While Investigating Industrial Security Across Solar and BESS Sites

Comments
6 min read
Building a Virtualized Cybersecurity Lab: Splunk SIEM Setup and Log Forwarding

Building a Virtualized Cybersecurity Lab: Splunk SIEM Setup and Log Forwarding

1
Comments
5 min read
DEV Track Spotlight: Red Team vs Blue Team - Securing AI Agents (DEV317)

DEV Track Spotlight: Red Team vs Blue Team - Securing AI Agents (DEV317)

1
Comments
5 min read
Why Isn’t True Zero-Trust Encryption Used in Email Systems?

Why Isn’t True Zero-Trust Encryption Used in Email Systems?

Comments
1 min read
Enterprise Architecture for a blog nobody reads

Enterprise Architecture for a blog nobody reads

Comments 1
12 min read
React2Shell: CVE-2025-55182 | TryHackMe Write-Up

React2Shell: CVE-2025-55182 | TryHackMe Write-Up

Comments
4 min read
Why I switched to an unknown WAF

Why I switched to an unknown WAF

Comments
4 min read
How to Secure Your AI App Against Prompt Injection in 5 Minutes

How to Secure Your AI App Against Prompt Injection in 5 Minutes

Comments
5 min read
Zero Trust Security Explained: Why "Firewalls" Are Dead in 2026

Zero Trust Security Explained: Why "Firewalls" Are Dead in 2026

Comments
1 min read
loading...