DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Preventing SQL Injection: Essential Defense Tactics for Web Developers

Preventing SQL Injection: Essential Defense Tactics for Web Developers

1
Comments
2 min read
ARP Spoofing Explained Like You Are New to Networking

ARP Spoofing Explained Like You Are New to Networking

10
Comments
3 min read
CVE-2007-0671: Microsoft Office Excel Remote Code Execution Vulnerability

CVE-2007-0671: Microsoft Office Excel Remote Code Execution Vulnerability

1
Comments
1 min read
CVE-2025-8088: RARLAB WinRAR Path Traversal Vulnerability

CVE-2025-8088: RARLAB WinRAR Path Traversal Vulnerability

1
Comments
1 min read
AI Workload Security in 2025: The Battle to Safeguard ML Pipelines

AI Workload Security in 2025: The Battle to Safeguard ML Pipelines

2
Comments
3 min read
The intel Management Engine:~The Ghost in your machine

The intel Management Engine:~The Ghost in your machine

2
Comments
3 min read
Top 5 Open Source WAFs to Secure Your Web Apps in 2025

Top 5 Open Source WAFs to Secure Your Web Apps in 2025

8
Comments 1
3 min read
Akira Ransomware Hits SonicWall VPNs in Zero-Day Attack

Akira Ransomware Hits SonicWall VPNs in Zero-Day Attack

1
Comments
1 min read
One Bug, Many Faces: Understanding Every Type of Race Condition Vulnerability

One Bug, Many Faces: Understanding Every Type of Race Condition Vulnerability

Comments
13 min read
CVE-2024-9680: Mozilla Firefox Use-After-Free Vulnerability

CVE-2024-9680: Mozilla Firefox Use-After-Free Vulnerability

1
Comments
2 min read
CVE-2024-49039: Microsoft Windows Task Scheduler Privilege Escalation Vulnerability

CVE-2024-49039: Microsoft Windows Task Scheduler Privilege Escalation Vulnerability

1
Comments
2 min read
When AI Fights Back: The Next Decade of Digital Security

When AI Fights Back: The Next Decade of Digital Security

1
Comments 1
3 min read
Meet MIC: The Digital Security Guard in Your Wi-Fi

Meet MIC: The Digital Security Guard in Your Wi-Fi

10
Comments
3 min read
Configuring Hybrid Authentication (Certificates + Users) in AWS Client VPN

Configuring Hybrid Authentication (Certificates + Users) in AWS Client VPN

Comments
5 min read
How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.