DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

3
Comments
9 min read
Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

6
Comments
4 min read
I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

Comments
1 min read
How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

1
Comments
6 min read
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

1
Comments
12 min read
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

1
Comments
6 min read
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

1
Comments
7 min read
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

1
Comments 1
7 min read
Hackers Rob. Security Reads the Manual.

Hackers Rob. Security Reads the Manual.

Comments
3 min read
SafeLine v9.3.0: Evolving a Semantic Analysis WAF for Modern Web Security

SafeLine v9.3.0: Evolving a Semantic Analysis WAF for Modern Web Security

Comments
3 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
No Complex Regular Expressions Required: The New SLS Data Masking Function Makes Privacy Protection Simpler and More Efficient

No Complex Regular Expressions Required: The New SLS Data Masking Function Makes Privacy Protection Simpler and More Efficient

Comments
7 min read
Two Critical n8n Vulnerabilities: Sandbox Escapes Leading to Full Remote Code Execution

Two Critical n8n Vulnerabilities: Sandbox Escapes Leading to Full Remote Code Execution

Comments
4 min read
Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

1
Comments
7 min read
Browser Fingerprinting: How Websites Track You Even With a VPN (And How to Stop It)

Browser Fingerprinting: How Websites Track You Even With a VPN (And How to Stop It)

3
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.