DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

2
Comments
2 min read
I got 99 problems, but a breach ain’t one

I got 99 problems, but a breach ain’t one

1
Comments
5 min read
OAuth Misconfiguration in Symfony Explained

OAuth Misconfiguration in Symfony Explained

3
Comments
3 min read
Future proofing your platform

Future proofing your platform

1
Comments
5 min read
SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

6
Comments
2 min read
🛡️ Cybersecurity Review Guide for React & Vite Applications

🛡️ Cybersecurity Review Guide for React & Vite Applications

Comments
2 min read
Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

1
Comments
2 min read
Using SBOMs to detect possible Dependency Confusion

Using SBOMs to detect possible Dependency Confusion

Comments 1
4 min read
Remotely Control Any Computer with Mythic C2 and Discord | Step-by-Step Ethical Hacking Guide

Remotely Control Any Computer with Mythic C2 and Discord | Step-by-Step Ethical Hacking Guide

2
Comments
4 min read
The Ultimate Fusion: Linux, Ubuntu, and Cybersecurity | by Faruk Ahmed | Jun, 2025

The Ultimate Fusion: Linux, Ubuntu, and Cybersecurity | by Faruk Ahmed | Jun, 2025

1
Comments
1 min read
CVE-2025-20281: Cisco Identity Services Engine Injection Vulnerability

CVE-2025-20281: Cisco Identity Services Engine Injection Vulnerability

2
Comments
1 min read
CVE-2025-20337: Cisco Identity Services Engine Injection Vulnerability

CVE-2025-20337: Cisco Identity Services Engine Injection Vulnerability

2
Comments
1 min read
How to Use SafePoint Cyber Threat Intelligence API

How to Use SafePoint Cyber Threat Intelligence API

5
Comments
4 min read
Building Bulletproof On-Demand Apps in 2025: Cybersecurity Best Practices for Developers

Building Bulletproof On-Demand Apps in 2025: Cybersecurity Best Practices for Developers

1
Comments
7 min read
Breaking Into the Machine: A Deep Dive Into Automotive Penetration Testing Techniques

Breaking Into the Machine: A Deep Dive Into Automotive Penetration Testing Techniques

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.