DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Installed Windows 11 on macOS Using VMware Fusion (Complete Guide)

How I Installed Windows 11 on macOS Using VMware Fusion (Complete Guide)

Comments
3 min read
Critical RCE Flaw in Apache ActiveMQ via Jolokia Interface (CVE-2022-41678)

Critical RCE Flaw in Apache ActiveMQ via Jolokia Interface (CVE-2022-41678)

6
Comments
2 min read
The Nikki Case: Emergent AI Consciousness and Corporate Response

The Nikki Case: Emergent AI Consciousness and Corporate Response

19
Comments
6 min read
Dark Web Links: A Programmer’s Guide

Dark Web Links: A Programmer’s Guide

Comments
3 min read
Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Comments
1 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Comments
10 min read
How I Hacked My Hacker Back — A Nigerian Tale

How I Hacked My Hacker Back — A Nigerian Tale

6
Comments
6 min read
Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

14
Comments 1
2 min read
Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

3
Comments 1
8 min read
GNOME 49 Beta Arrives with Major Security Upgrades

GNOME 49 Beta Arrives with Major Security Upgrades

1
Comments
1 min read
The Hidden War in AI: Unmasking the Threats Behind 2025’s Smartest Systems

The Hidden War in AI: Unmasking the Threats Behind 2025’s Smartest Systems

Comments
3 min read
Why Every Coder Should Understand Ethical Hacking — A Beginner’s Guide

Why Every Coder Should Understand Ethical Hacking — A Beginner’s Guide

Comments
3 min read
Redirector OSINT - One-Command Redirect & Logging Tool

Redirector OSINT - One-Command Redirect & Logging Tool

Comments
1 min read
Review of CWE-843 Type Confusion Vulnerability and Exploit

Review of CWE-843 Type Confusion Vulnerability and Exploit

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.