DEV Community

CyberPath

CyberPath: Tools and Knowledge for Security Professionals

Hub for cybersecurity excellence. Explore certifications, open-source tools, and advanced platforms: from certification discovery to asset management and desktop app development. Empower your security journey.

How Stolen AI Models Can Compromise Your Entire Organization

How Stolen AI Models Can Compromise Your Entire Organization

Comments
20 min read
How 10,000 API Queries Can Clone Your $3M AI Model

How 10,000 API Queries Can Clone Your $3M AI Model

Comments
17 min read
Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

Agentic AI vs. Agentic Attacks: The Autonomous Threat Landscape of 2026

1
Comments
7 min read
Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

Supply Chain Attacks on AI Models: How Attackers Inject Backdoors Through Poisoned LoRA Adapters and Compromised Model Weights

1
Comments
6 min read
Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

Prompt Injection Attacks: The Top AI Threat in 2026 and How to Defend Against It

1
Comments
7 min read
LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

LLM Red Teaming: The New Penetration Testing Discipline and How to Build Your Internal Red Team

1
Comments 1
7 min read
How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

How 250 Malicious Documents Can Backdoor Any AI Model—The Data Poisoning Crisis Explained

1
Comments
6 min read
Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

Deepfakes as a Cyber Weapon: Detection, Defense, and the New Authentication Crisis

1
Comments
12 min read
loading...