Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 21
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time
#
security
#
appsec
#
vulnerabilities
#
ai
Comments
Add Comment
5 min read
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 20
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program
#
security
#
appsec
#
vulnerabilities
#
ai
Comments
Add Comment
4 min read
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack
Armor1
Armor1
Armor1
Follow
Apr 16
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack
#
security
#
python
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
Excalibra
Excalibra
Excalibra
Follow
Apr 13
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
#
malware
#
vulnerabilities
#
redteam
#
cybersecurity
5
 reactions
Comments
Add Comment
6 min read
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
Calin V.
Calin V.
Calin V.
Follow
Apr 9
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
#
security
#
wordpress
#
cybersecurity
#
vulnerabilities
Comments
Add Comment
6 min read
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Apr 8
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws
#
llms
#
security
#
vulnerabilities
#
formalverification
Comments
Add Comment
10 min read
CVE-2026-21852: How enableAllProjectMcpServers Leaks Your Entire Source Code
Sattyam Jain
Sattyam Jain
Sattyam Jain
Follow
Apr 7
CVE-2026-21852: How enableAllProjectMcpServers Leaks Your Entire Source Code
#
ai
#
aiops
#
vulnerabilities
Comments
Add Comment
3 min read
Vulnerabities are being exploited faster than ever: opportunity in disguise
Mikail Kocak
Mikail Kocak
Mikail Kocak
Follow
Apr 7
Vulnerabities are being exploited faster than ever: opportunity in disguise
#
cybersecurity
#
infosec
#
vulnerabilities
Comments
Add Comment
2 min read
Ambiguous MCP Instructions Enable Unauthorized AI Actions: Enhanced Validation and Oversight Proposed
Olga Larionova
Olga Larionova
Olga Larionova
Follow
Apr 2
Ambiguous MCP Instructions Enable Unauthorized AI Actions: Enhanced Validation and Oversight Proposed
#
ai
#
security
#
ambiguity
#
vulnerabilities
Comments
Add Comment
10 min read
Mongoose Library Flaws Expose Devices to RCE and mTLS Bypass: Update to Version 7.21+ to Mitigate Risks
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Apr 2
Mongoose Library Flaws Expose Devices to RCE and mTLS Bypass: Update to Version 7.21+ to Mitigate Risks
#
iot
#
rce
#
mtls
#
vulnerabilities
Comments
Add Comment
6 min read
I Asked My AI Agent About axios. It Knew Everything in 0.03ms.
Mr. 0x1
Mr. 0x1
Mr. 0x1
Follow
Apr 5
I Asked My AI Agent About axios. It Knew Everything in 0.03ms.
#
security
#
mcp
#
ai
#
vulnerabilities
1
 reaction
Comments
Add Comment
4 min read
Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem
Maxim Gerasimov
Maxim Gerasimov
Maxim Gerasimov
Follow
Apr 1
Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem
#
security
#
dependencies
#
npm
#
vulnerabilities
Comments
Add Comment
8 min read
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 31
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks
#
security
#
authentication
#
vulnerabilities
#
mcp
Comments
Add Comment
9 min read
Why Automated Vulnerability Scanners Miss Most Real Security Vulnerabilities
Kuboid Secure Layer
Kuboid Secure Layer
Kuboid Secure Layer
Follow
Mar 30
Why Automated Vulnerability Scanners Miss Most Real Security Vulnerabilities
#
cybersecurity
#
automation
#
vulnerabilities
#
scanner
Comments
Add Comment
6 min read
Android's March 2026 Security Update: 100+ CVEs, One Under Active Exploitation
Tiamat
Tiamat
Tiamat
Follow
Mar 9
Android's March 2026 Security Update: 100+ CVEs, One Under Active Exploitation
#
android
#
security
#
vulnerabilities
#
privacy
1
 reaction
Comments
Add Comment
5 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account