DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Meshtastic Security: A Realistic Threat Model for Off-Grid Networks

Meshtastic Security: A Realistic Threat Model for Off-Grid Networks

Comments
2 min read
CVE-2025-5419 - Google Chrome V8 Engine Out-of-Bounds Read/Write Vulnerability

CVE-2025-5419 - Google Chrome V8 Engine Out-of-Bounds Read/Write Vulnerability

Comments
9 min read
Brave New World of Scammers Targeting Developers

Brave New World of Scammers Targeting Developers

Comments
15 min read
GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

Comments
2 min read
Stop Being a Script Kiddie: building a Port Scanner with Python 🐍

Stop Being a Script Kiddie: building a Port Scanner with Python 🐍

1
Comments
3 min read
Self-hosted WAFs in Cloud-Native Storage Architectures: What Security Teams Need to Know

Self-hosted WAFs in Cloud-Native Storage Architectures: What Security Teams Need to Know

Comments
3 min read
Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Comments
7 min read
CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

Comments
2 min read
GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

Comments
2 min read
Understanding the Latest OWASP Top 10 2025 Changes

Understanding the Latest OWASP Top 10 2025 Changes

Comments
4 min read
How to Enable MAC Address Randomisation in Linux Desktop

How to Enable MAC Address Randomisation in Linux Desktop

Comments
2 min read
Understanding Encryption in LoRa & Meshtastic Networks

Understanding Encryption in LoRa & Meshtastic Networks

Comments
2 min read
Understanding Prompt Injection Attacks

Understanding Prompt Injection Attacks

1
Comments
5 min read
CVE-2026-24001: Diffing Dangerously: Infinite Loops and ReDoS in jsdiff

CVE-2026-24001: Diffing Dangerously: Infinite Loops and ReDoS in jsdiff

Comments
2 min read
OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.