DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Splunk Boss of the SOC- Corelight trickbot ctf

Splunk Boss of the SOC- Corelight trickbot ctf

Comments
5 min read
25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

Comments
1 min read
$10 to Get a Powerful, Non-Signature-based WAF

$10 to Get a Powerful, Non-Signature-based WAF

5
Comments
1 min read
How to Create an Architecture with WAF in between Two Nginx

How to Create an Architecture with WAF in between Two Nginx

5
Comments
2 min read
Ranga Premsai Joins Forbes Technology Council: A Step Forward in Cybersecurity Leadership

Ranga Premsai Joins Forbes Technology Council: A Step Forward in Cybersecurity Leadership

Comments
3 min read
Securing Flight Paths: A Developer's Guide to Mitigating DDoS Attacks in Aviation

Securing Flight Paths: A Developer's Guide to Mitigating DDoS Attacks in Aviation

Comments
2 min read
Prevent Business Logic Vulnerabilities in Laravel

Prevent Business Logic Vulnerabilities in Laravel

2
Comments
3 min read
Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Comments
1 min read
The Urgent Need for You to Be Security Conscious

The Urgent Need for You to Be Security Conscious

Comments
2 min read
Is Your ServiceNow Integration Strategy Up to Date? 5 Surprising Benefits You Didn’t Know

Is Your ServiceNow Integration Strategy Up to Date? 5 Surprising Benefits You Didn’t Know

Comments
5 min read
Could Drosera Traps Have Prevented Bybit’s $1.4 Billion Hack?

Could Drosera Traps Have Prevented Bybit’s $1.4 Billion Hack?

5
Comments
6 min read
🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

5
Comments
1 min read
Top Hacking Gadgets for 2025 - @verylazytech

Top Hacking Gadgets for 2025 - @verylazytech

5
Comments
1 min read
Advanced Diploma in Artificial Intelligence and Machine Learning

Advanced Diploma in Artificial Intelligence and Machine Learning

Comments
4 min read
AI in Vulnerability Scanners: Transforming Cybersecurity Threat Detection

AI in Vulnerability Scanners: Transforming Cybersecurity Threat Detection

Comments
4 min read
How to Transition from IT Support to Cybersecurity: A Complete Career Guide

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

21
Comments 6
4 min read
Prevent Unvalidated Redirects in Laravel Securely

Prevent Unvalidated Redirects in Laravel Securely

3
Comments
2 min read
REACT Tips and Tricks to Excel

REACT Tips and Tricks to Excel

Comments
3 min read
Blockchain and Cybersecurity: Unlocking the Future of Secure Digital Interactions

Blockchain and Cybersecurity: Unlocking the Future of Secure Digital Interactions

Comments
2 min read
🔒 Why HTTPS Matters: Securing Your Website in 2025 🚀

🔒 Why HTTPS Matters: Securing Your Website in 2025 🚀

5
Comments
2 min read
Cybersecurity in the Digital Age: Best Practices for Software Developers

Cybersecurity in the Digital Age: Best Practices for Software Developers

Comments
5 min read
Art Blocks in Cyberwar Scenarios: Navigating the Cybersecurity Landscape of Digital Art

Art Blocks in Cyberwar Scenarios: Navigating the Cybersecurity Landscape of Digital Art

Comments
2 min read
Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Comments
3 min read
Act as Adversary Simulation: A Smarter Approach to Staying Ahead of Attackers

Act as Adversary Simulation: A Smarter Approach to Staying Ahead of Attackers

Comments
4 min read
Guardius and OWASP ZAP: Boosting Web Application Security with Comprehensive Scanning

Guardius and OWASP ZAP: Boosting Web Application Security with Comprehensive Scanning

Comments
3 min read
loading...