DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
LetsDefend.io | SOC202- FakeGPT Malicious Chrome Extension

LetsDefend.io | SOC202- FakeGPT Malicious Chrome Extension

Comments
5 min read
Lock & Key: A Developer’s Guide to Encryption and Decryption in JavaScript

Lock & Key: A Developer’s Guide to Encryption and Decryption in JavaScript

23
Comments 5
3 min read
🔒 Dymo has identified a critical vulnerability affecting the Public Prosecution Office of the Sultanate of Oman

🔒 Dymo has identified a critical vulnerability affecting the Public Prosecution Office of the Sultanate of Oman

1
Comments
1 min read
Generative AI in Action: Real Business Problems, Smarter Solutions

Generative AI in Action: Real Business Problems, Smarter Solutions

Comments
5 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Comments
2 min read
CPS 234 Compliance in 2025: Essential Steps for Australian Financial Sector Security

CPS 234 Compliance in 2025: Essential Steps for Australian Financial Sector Security

Comments
3 min read
Web Application Penetration Testing: How to Hack Like a Hacker (Before You Find You)

Web Application Penetration Testing: How to Hack Like a Hacker (Before You Find You)

2
Comments
3 min read
Diary of a Firewall: Facing Thousands of Threats Every Day

Diary of a Firewall: Facing Thousands of Threats Every Day

Comments
3 min read
🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible

🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible

Comments
2 min read
Advanced Web Security Best Practices: Securing Your Web Apps against Today's Threats

Advanced Web Security Best Practices: Securing Your Web Apps against Today's Threats

1
Comments
3 min read
Master Real-World Attack Detection with This Open Source WAF

Master Real-World Attack Detection with This Open Source WAF

7
Comments 1
3 min read
The Ultimate Guide to SSH Hardening: Secure Your Remote Access

The Ultimate Guide to SSH Hardening: Secure Your Remote Access

1
Comments
4 min read
Building Rate Limiting That Actually Works

Building Rate Limiting That Actually Works

3
Comments 2
8 min read
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

8
Comments 1
3 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide

How to Prevent Phishing Attacks: A Technical Implementation Guide

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.