DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Choosing the Right Performance Mode in SafeLine

Choosing the Right Performance Mode in SafeLine

5
Comments
1 min read
How I Caught an MPESA API Leak Hiding in Plain Sight

How I Caught an MPESA API Leak Hiding in Plain Sight

2
Comments
2 min read
10 Best Platforms to Learn Cybersecurity Courses in 2025

10 Best Platforms to Learn Cybersecurity Courses in 2025

2
Comments
5 min read
ICMP Spoofing with Scapy: Responding to Pings as a Fake IP

ICMP Spoofing with Scapy: Responding to Pings as a Fake IP

1
Comments
2 min read
AI Powered Honeypot

AI Powered Honeypot

Comments
2 min read
Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Comments
4 min read
Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

6
Comments
2 min read
What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

2
Comments
2 min read
I got 99 problems, but a breach ain’t one

I got 99 problems, but a breach ain’t one

1
Comments
5 min read
OAuth Misconfiguration in Symfony Explained

OAuth Misconfiguration in Symfony Explained

3
Comments
3 min read
Future proofing your platform

Future proofing your platform

1
Comments
5 min read
SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

6
Comments
2 min read
🛡️ Cybersecurity Review Guide for React & Vite Applications

🛡️ Cybersecurity Review Guide for React & Vite Applications

Comments
2 min read
Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

1
Comments
2 min read
Using SBOMs to detect possible Dependency Confusion

Using SBOMs to detect possible Dependency Confusion

Comments 1
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.