DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

1
Comments 2
5 min read
A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

1
Comments 1
5 min read
Think You’re Secure? Penetration Testing Will Tell You the Truth

Think You’re Secure? Penetration Testing Will Tell You the Truth

44
Comments
6 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

20
Comments 12
4 min read
The Importance of an AI Strategy

The Importance of an AI Strategy

16
Comments
12 min read
Protecting Against Open Source Malicious Packages: What Does (Not) Work

Protecting Against Open Source Malicious Packages: What Does (Not) Work

2
Comments
14 min read
Hack the box - Dancing (SMB)

Hack the box - Dancing (SMB)

Comments
2 min read
15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

Comments
34 min read
Zero Trust Security: Why It’s No Longer Optional

Zero Trust Security: Why It’s No Longer Optional

Comments
1 min read
AWS IAM Tutorial for Beginners: Easy Steps to Manage Access

AWS IAM Tutorial for Beginners: Easy Steps to Manage Access

2
Comments 2
5 min read
How to Harden Docker Deployments with SafeLine WAF

How to Harden Docker Deployments with SafeLine WAF

6
Comments
3 min read
I’m glad to share that I have successfully completed the main technical track of the Cybersecurity Academy scholarship

I’m glad to share that I have successfully completed the main technical track of the Cybersecurity Academy scholarship

1
Comments
1 min read
How SafeLine Uses Dynamic Encryption to Defeat Crawlers and Scanners

How SafeLine Uses Dynamic Encryption to Defeat Crawlers and Scanners

6
Comments
2 min read
Are We Letting Social Media Raise Our Children?

Are We Letting Social Media Raise Our Children?

Comments
2 min read
SafeLine vs Reblaze: Smarter WAF for Modern Web Protection?

SafeLine vs Reblaze: Smarter WAF for Modern Web Protection?

10
Comments
2 min read
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution

iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution

6
Comments
2 min read
Understanding Microsoft SharePoint Zero-Day Vulnerabilities — What Developers Should Know

Understanding Microsoft SharePoint Zero-Day Vulnerabilities — What Developers Should Know

Comments
2 min read
UAT-7237 Targets Taiwan Servers with Custom Hacking Tools

UAT-7237 Targets Taiwan Servers with Custom Hacking Tools

1
Comments
1 min read
A Practical Guide to Free Vulnerability Scanners for Developers and Security Teams

A Practical Guide to Free Vulnerability Scanners for Developers and Security Teams

Comments
3 min read
Creating a extremely secure hacker-proof system

Creating a extremely secure hacker-proof system

3
Comments
4 min read
Protect Your Web Application with SafeLine: A Step-by-Step Guide

Protect Your Web Application with SafeLine: A Step-by-Step Guide

6
Comments
2 min read
Safeline + Ingress-nginx: WAF Integration Guide for K8s

Safeline + Ingress-nginx: WAF Integration Guide for K8s

6
Comments
3 min read
How to Secure Your Kubernetes Apps with SafeLine WAF and Ingress-nginx

How to Secure Your Kubernetes Apps with SafeLine WAF and Ingress-nginx

6
Comments
2 min read
Deploy SafeLine WAF with Docker — A Step-by-Step Guide

Deploy SafeLine WAF with Docker — A Step-by-Step Guide

6
Comments
2 min read
Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

1
Comments
4 min read
loading...