DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SubX: A Fast Subdomain Buster & Full-Site Crawler with Screenshots (Python + Async)

SubX: A Fast Subdomain Buster & Full-Site Crawler with Screenshots (Python + Async)

5
Comments
2 min read
Cybercrime Trends 2025 & How to Shield Your Startup...

Cybercrime Trends 2025 & How to Shield Your Startup...

1
Comments
2 min read
Custom Exploit Development

Custom Exploit Development

5
Comments
5 min read
Comparison on Six Self-Hosted WAF

Comparison on Six Self-Hosted WAF

Comments
4 min read
What Is A DMARC? How It Protects Your Domain From Phishing And Spoofing

What Is A DMARC? How It Protects Your Domain From Phishing And Spoofing

Comments
3 min read
Cracking the Vault: A Nostalgic Hack at Zero Nights 2017 🚪💻

Cracking the Vault: A Nostalgic Hack at Zero Nights 2017 🚪💻

2
Comments
9 min read
Critical Vulnerability in v380 Cameras: How Plaintext Credentials Exposed Millions of Devices

Critical Vulnerability in v380 Cameras: How Plaintext Credentials Exposed Millions of Devices

5
Comments
18 min read
Understanding Zero Trust in DevOps Environments

Understanding Zero Trust in DevOps Environments

Comments
3 min read
What I Keep Finding When I Scan Small U.S. Municipal Websites (And How To Fix It In Under An Hour)

What I Keep Finding When I Scan Small U.S. Municipal Websites (And How To Fix It In Under An Hour)

5
Comments 5
6 min read
Faceless Hacker in Africa: My VAPT-to-Bug Bounty Workflow (Step-by-Step)

Faceless Hacker in Africa: My VAPT-to-Bug Bounty Workflow (Step-by-Step)

Comments
3 min read
How to Choose the Right DDoS Protection Service: Complete 2025 Business Guide

How to Choose the Right DDoS Protection Service: Complete 2025 Business Guide

1
Comments
6 min read
7 Cybersecurity Concerns Related to The MCP Protocol

7 Cybersecurity Concerns Related to The MCP Protocol

Comments
5 min read
How to Protect Your Site from Cyber Attacks: Website Security Guide 2025

How to Protect Your Site from Cyber Attacks: Website Security Guide 2025

2
Comments 1
6 min read
Threat Modeling the YouTube Algorithm: A Security Researcher's Guide to Content Strategy

Threat Modeling the YouTube Algorithm: A Security Researcher's Guide to Content Strategy

5
Comments 7
13 min read
Bot Defense Case Study: Real-World Traffic Comparison with SafeLine WAF

Bot Defense Case Study: Real-World Traffic Comparison with SafeLine WAF

10
Comments
2 min read
PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

2
Comments
6 min read
🔒 5 Best Practices to Keep Your Website Secure

🔒 5 Best Practices to Keep Your Website Secure

Comments
3 min read
Simulated Attack: How a 33% consensus risk puts Sui one incident away from a network halt

Simulated Attack: How a 33% consensus risk puts Sui one incident away from a network halt

Comments
4 min read
Where do long-dwell attackers hide inside modern networks?

Where do long-dwell attackers hide inside modern networks?

Comments
1 min read
OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

1
Comments
2 min read
The Required API Security Checklist [XLS download]

The Required API Security Checklist [XLS download]

Comments
5 min read
The Silent Breach: Why Most Developers Still Underestimate Cybersecurity

The Silent Breach: Why Most Developers Still Underestimate Cybersecurity

Comments
2 min read
How Attackers Are Using Blockchains to Hide Malware

How Attackers Are Using Blockchains to Hide Malware

5
Comments
3 min read
Industries Where Your C Code Saves Lives (And They're Hiring)

Industries Where Your C Code Saves Lives (And They're Hiring)

Comments 6
8 min read
Can We Trust AI Browsers?

Can We Trust AI Browsers?

Comments
3 min read
loading...