DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Queen City Con 0x3: Hacking And Embracing Resiliency

Queen City Con 0x3: Hacking And Embracing Resiliency

Comments
8 min read
It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

Comments
5 min read
SafeLine: The Open-Source WAF That Actually Protects Your Web Apps

SafeLine: The Open-Source WAF That Actually Protects Your Web Apps

Comments
4 min read
Hands-On TLS: Inspect Certificates, Verify PFS, and Build a Local HTTPS Server

Hands-On TLS: Inspect Certificates, Verify PFS, and Build a Local HTTPS Server

9
Comments
2 min read
Why Identity Threat Detection & Response (ITDR) Is Becoming Essential in Modern Security

Why Identity Threat Detection & Response (ITDR) Is Becoming Essential in Modern Security

Comments
3 min read
Building an Intentionally Vulnerable AWS Lab to Teach Cloud Security

Building an Intentionally Vulnerable AWS Lab to Teach Cloud Security

2
Comments
10 min read
How to Build India's Cheapest (Yet Most Effective) Penetration Testing Tool 🔥

How to Build India's Cheapest (Yet Most Effective) Penetration Testing Tool 🔥

Comments
7 min read
Plataforma Para Reportar Golpes: Cyber Alerts 🛡️

Plataforma Para Reportar Golpes: Cyber Alerts 🛡️

1
Comments
1 min read
My Writeup (0day in Zsh (RCE))

My Writeup (0day in Zsh (RCE))

11
Comments 1
5 min read
Indirect Prompt Injection: The Sneaky AI Vulnerability You Need to Know

Indirect Prompt Injection: The Sneaky AI Vulnerability You Need to Know

5
Comments
5 min read
Web Privacy Is Not Incognito Mode

Web Privacy Is Not Incognito Mode

3
Comments 4
3 min read
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

Comments
4 min read
Hands-On: See Image Metadata Removal in Action

Hands-On: See Image Metadata Removal in Action

120
Comments 2
6 min read
Why Some Android Games Resist NaĂŻve Reverse Engineering

Why Some Android Games Resist NaĂŻve Reverse Engineering

1
Comments 1
5 min read
Splunk | Advent of Cyber 2025 Day 3 Write-Up

Splunk | Advent of Cyber 2025 Day 3 Write-Up

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.