DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-26194: CVE-2026-26194: Command Option Injection in Gogs Release Deletion

CVE-2026-26194: CVE-2026-26194: Command Option Injection in Gogs Release Deletion

Comments
2 min read
I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

1
Comments
2 min read
The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

Comments
6 min read
GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

1
Comments
2 min read
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)

How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)

1
Comments
3 min read
Breaking: New "PleaseFix" Vulnerabilities Turn AI Agents Against Their Users

Breaking: New "PleaseFix" Vulnerabilities Turn AI Agents Against Their Users

Comments
3 min read
Every Hacker Should Build This Active Directory Lab

Every Hacker Should Build This Active Directory Lab

1
Comments
8 min read
Day 11: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Day 11: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Comments
1 min read
Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis

Phobos Ransomware TTPs: Wire Fraud Conspiracy Attack Analysis

Comments
5 min read
Why I Moved Part of My Traffic Off a Cloud WAF In 2026

Why I Moved Part of My Traffic Off a Cloud WAF In 2026

1
Comments
4 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

Comments
3 min read
How to Protect APIs from Cyber Attacks

How to Protect APIs from Cyber Attacks

Comments
3 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.