DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

8
Comments 1
3 min read
Building Rate Limiting That Actually Works

Building Rate Limiting That Actually Works

3
Comments 2
8 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide

How to Prevent Phishing Attacks: A Technical Implementation Guide

Comments
2 min read
Cybersecurity worm WannaCry

Cybersecurity worm WannaCry

Comments
1 min read
Zero Trust, One Router: Hardening Your Home Lab Like a Cyber Fortress.

Zero Trust, One Router: Hardening Your Home Lab Like a Cyber Fortress.

Comments
20 min read
Kali Linux Labs: Nmap Reconnaissance, User Management, and Nikto Web Vulnerability Scanning

Kali Linux Labs: Nmap Reconnaissance, User Management, and Nikto Web Vulnerability Scanning

2
Comments
2 min read
Lessons Learned: My First Ethical Hack with TryHackMe's "Offensive Security Intro"

Lessons Learned: My First Ethical Hack with TryHackMe's "Offensive Security Intro"

2
Comments
2 min read
WharpDOS – I Built an ARP-Based DoS Tool in Python to Learn Network Attacks (Ethically)

WharpDOS – I Built an ARP-Based DoS Tool in Python to Learn Network Attacks (Ethically)

Comments
2 min read
Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Comments
2 min read
HackThisSite Basic 1

HackThisSite Basic 1

Comments
1 min read
Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models

Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models

5
Comments 1
2 min read
7 Leading MDR Solutions: Enhancing Your Security Posture

7 Leading MDR Solutions: Enhancing Your Security Posture

Comments
7 min read
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
Unleashing AI: Revolutionizing Digital Forensics and Incident Response

Unleashing AI: Revolutionizing Digital Forensics and Incident Response

2
Comments 1
7 min read
What Is JA4 Fingerprinting and Why It Matters for WAFs

What Is JA4 Fingerprinting and Why It Matters for WAFs

6
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.