DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Features of Integrating Nmap with Python Using subprocess.

Features of Integrating Nmap with Python Using subprocess.

1
Comments
3 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion

Shields Up Defense Tech: Red Team Attack Surface Expansion

Comments
5 min read
The MCP Security Research Race: Five Teams, Five Different Problems

The MCP Security Research Race: Five Teams, Five Different Problems

Comments
4 min read
How ClawMoat Would Have Prevented ClawHavoc: A Technical Case Study

How ClawMoat Would Have Prevented ClawHavoc: A Technical Case Study

Comments
5 min read
CrowdStrike Says OpenClaw Is Dangerous. They're Right. Here's What To Do About It.

CrowdStrike Says OpenClaw Is Dangerous. They're Right. Here's What To Do About It.

Comments
5 min read
RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘

RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘

5
Comments
3 min read
How ClawMoat Would Have Prevented ClawHavoc

How ClawMoat Would Have Prevented ClawHavoc

Comments
5 min read
CrowdStrike Says OpenClaw Is Dangerous. They're Right. Here's What To Do About It.

CrowdStrike Says OpenClaw Is Dangerous. They're Right. Here's What To Do About It.

Comments
5 min read
CVE-2026-27206: The Zumba Class Dance: RCE via PHP Object Injection in json-serializer

CVE-2026-27206: The Zumba Class Dance: RCE via PHP Object Injection in json-serializer

Comments
2 min read
Step-by-Step Guide to Creating a Cyber Risk Assessment Tool for Small Businesses

Step-by-Step Guide to Creating a Cyber Risk Assessment Tool for Small Businesses

Comments
3 min read
I Let Users Write HTML Templates - Here Are 6 Security Holes I Had to Patch

I Let Users Write HTML Templates - Here Are 6 Security Holes I Had to Patch

4
Comments
6 min read
Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss

Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss

3
Comments
2 min read
SeeTheSharpFlag — Hack The Box Mobile Challenge Write-up

SeeTheSharpFlag — Hack The Box Mobile Challenge Write-up

Comments
2 min read
GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

Comments
2 min read
There's Always a Hardcoded Secret Somewhere — Meet Titus

There's Always a Hardcoded Secret Somewhere — Meet Titus

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.