DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Top Tools and Applications That Support SOCKS5 Proxies

Top Tools and Applications That Support SOCKS5 Proxies

3
Comments
5 min read
Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

1
Comments
4 min read
SOCKS4 vs SOCKS5: Key Differences, Security Features, and Comparisons with HTTP & VPN

SOCKS4 vs SOCKS5: Key Differences, Security Features, and Comparisons with HTTP & VPN

1
Comments
7 min read
QRTrust: Privacy-First QR Scanner with Phishing Detection

QRTrust: Privacy-First QR Scanner with Phishing Detection

Comments
3 min read
Why Generative AI is a Double-Edged Sword for Enterprise Security.

Why Generative AI is a Double-Edged Sword for Enterprise Security.

1
Comments
2 min read
Firewalls 101

Firewalls 101

Comments
12 min read
10 Best Free L7 DDoS Protection Tools in 2025

10 Best Free L7 DDoS Protection Tools in 2025

7
Comments 4
2 min read
KDE Gear 25.08 Released with Key Improvements

KDE Gear 25.08 Released with Key Improvements

1
Comments
1 min read
Boring Cybersecurity Theory: Security Domains From CISSP

Boring Cybersecurity Theory: Security Domains From CISSP

1
Comments
5 min read
Making a Browser That Slips Past WiFi Captive Portals — and Why This Loophole Isn’t Worth It

Making a Browser That Slips Past WiFi Captive Portals — and Why This Loophole Isn’t Worth It

4
Comments
5 min read
F5 BIG-IP RCE (CVE-2023-46747): What You Need to Know Right Now

F5 BIG-IP RCE (CVE-2023-46747): What You Need to Know Right Now

6
Comments
3 min read
CVE-2025-8876: N-able N-Central Command Injection Vulnerability

CVE-2025-8876: N-able N-Central Command Injection Vulnerability

1
Comments
1 min read
CVE-2025-8875: N-able N-Central Insecure Deserialization Vulnerability

CVE-2025-8875: N-able N-Central Insecure Deserialization Vulnerability

1
Comments
1 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

2
Comments
13 min read
Boring Cybersecurity Theory: Where it all began

Boring Cybersecurity Theory: Where it all began

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.