DEV Community

CyberPath

CyberPath: Tools and Knowledge for Security Professionals

Hub for cybersecurity excellence. Explore certifications, open-source tools, and advanced platforms: from certification discovery to asset management and desktop app development. Empower your security journey.

Joined on 
The Ultimate Database That Makes Compliance Audits Effortless

The Ultimate Database That Makes Compliance Audits Effortless

6 min read
How Stolen AI Models Can Compromise Your Entire Organization

How Stolen AI Models Can Compromise Your Entire Organization

20 min read
How 10,000 API Queries Can Clone Your $3M AI Model

How 10,000 API Queries Can Clone Your $3M AI Model

17 min read
Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

1
7 min read
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

1
6 min read
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

1
7 min read
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

1
1
7 min read
How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

1
6 min read
loading...