DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Detección de Intención: El fin de los ataques Evil Twin y el Ransomware mediante Blindaje Híbrido

Detección de Intención: El fin de los ataques Evil Twin y el Ransomware mediante Blindaje Híbrido

Comments
4 min read
BugBoard: A Centralized Dashboard for Bug Bounty Hunters & Security Researchers

BugBoard: A Centralized Dashboard for Bug Bounty Hunters & Security Researchers

Comments
3 min read
CVE-2026-24688: Ouroboros in the Outline: Infinite Loops in pypdf (CVE-2026-24688)

CVE-2026-24688: Ouroboros in the Outline: Infinite Loops in pypdf (CVE-2026-24688)

Comments
2 min read
CVE-2026-24490: MobSF Stored XSS: When the Scanner Becomes the Target

CVE-2026-24490: MobSF Stored XSS: When the Scanner Becomes the Target

Comments
2 min read
CVE-2026-24686: TUF Luck: Escaping the Sandbox in go-tuf via TAP 4 Map Files

CVE-2026-24686: TUF Luck: Escaping the Sandbox in go-tuf via TAP 4 Map Files

Comments
2 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Comments
5 min read
You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

Comments
10 min read
Post-Quantum Cryptography: Should Developers Start Preparing Now? 🔐⚛️

Post-Quantum Cryptography: Should Developers Start Preparing Now? 🔐⚛️

1
Comments 1
4 min read
Corporate Wargames: Red Teams vs Blue Teams

Corporate Wargames: Red Teams vs Blue Teams

1
Comments
3 min read
The Classic Bug: Command Injection in OpenCode's Server Mode

The Classic Bug: Command Injection in OpenCode's Server Mode

Comments
5 min read
I Found a Bug That Exposed Private Instagram Posts to Anyone.

I Found a Bug That Exposed Private Instagram Posts to Anyone.

1
Comments
6 min read
eBPF

eBPF

Comments
4 min read
The First Full-Scale Cyber War: 4 Years of Lessons

The First Full-Scale Cyber War: 4 Years of Lessons

Comments
7 min read
Llama Guard: What It Actually Does (And Doesn't Do)

Llama Guard: What It Actually Does (And Doesn't Do)

Comments
8 min read
CVE-2026-20883: The Zombie Stopwatch: Haunting Gitea with Revoked Access

CVE-2026-20883: The Zombie Stopwatch: Haunting Gitea with Revoked Access

Comments
2 min read
The USB that Changed Warfare: Lessons from Stuxnet

The USB that Changed Warfare: Lessons from Stuxnet

Comments
2 min read
CVE-2026-20897: Unlock Everything: The Gitea LFS IDOR (CVE-2026-20897)

CVE-2026-20897: Unlock Everything: The Gitea LFS IDOR (CVE-2026-20897)

Comments
2 min read
Exposing Scammers and Bots

Exposing Scammers and Bots

1
Comments
2 min read
CVE-2026-23954: Incus Escape: From Templates to Host Root

CVE-2026-23954: Incus Escape: From Templates to Host Root

Comments
2 min read
Is Your RAG System Leaking Data? 5 Minute Security Check

Is Your RAG System Leaking Data? 5 Minute Security Check

Comments
7 min read
CVE-2026-24009: YAML Deserialization: The Gift That Keeps on Giving in Docling-Core

CVE-2026-24009: YAML Deserialization: The Gift That Keeps on Giving in Docling-Core

Comments
2 min read
Cybersecurity 101

Cybersecurity 101

Comments
1 min read
FortiGate Secure Enterprise Network

FortiGate Secure Enterprise Network

1
Comments
3 min read
CVE-2026-0798: Gitea's Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers

CVE-2026-0798: Gitea's Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers

Comments
2 min read
CVE-2026-1225: XML Ghosts in the Machine: Configuring Your Way to RCE in Logback

CVE-2026-1225: XML Ghosts in the Machine: Configuring Your Way to RCE in Logback

Comments
2 min read
loading...