DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Role of Red Teaming in Cyber Resilience Planning

The Role of Red Teaming in Cyber Resilience Planning

1
Comments
3 min read
Toptal GitHub Hacked: 10 Malicious npm Packages Hit 5,000 Downloads

Toptal GitHub Hacked: 10 Malicious npm Packages Hit 5,000 Downloads

1
Comments
1 min read
Cybersecurity Tutorial: Your Complete Step-by-Step Guide

Cybersecurity Tutorial: Your Complete Step-by-Step Guide

1
Comments 1
6 min read
Boring Cybersecurity Theory: Frameworks (NIST)

Boring Cybersecurity Theory: Frameworks (NIST)

1
Comments
3 min read
Symmetric vs Asymmetric Encryption — Lessons from the Field

Symmetric vs Asymmetric Encryption — Lessons from the Field

1
Comments
2 min read
My Firebase Webapp almost got pwned by a bot. Then another bot saved it.

My Firebase Webapp almost got pwned by a bot. Then another bot saved it.

Comments
1 min read
SafeLine WAF: Custom Rules, Attack Prevention, and Dashboard Insights

SafeLine WAF: Custom Rules, Attack Prevention, and Dashboard Insights

6
Comments
2 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
CVE-2023-50164: New Struts2 Upload Vulnerability Explained

CVE-2023-50164: New Struts2 Upload Vulnerability Explained

6
Comments
3 min read
SafeLine vs. BunkerWeb: Which Open Source WAF Is Right for You?

SafeLine vs. BunkerWeb: Which Open Source WAF Is Right for You?

6
Comments
3 min read
Nmap Lab Series: Build Metasploit Scanners, Gather Info, & Exploit Vulnerabilities

Nmap Lab Series: Build Metasploit Scanners, Gather Info, & Exploit Vulnerabilities

Comments
2 min read
How to Get Real IPs Through FRP with SafeLine WAF

How to Get Real IPs Through FRP with SafeLine WAF

5
Comments
4 min read
Outil de Cybersécurité du Jour - Aug 17, 2025

Outil de Cybersécurité du Jour - Aug 17, 2025

1
Comments
3 min read
Graph to store your security data?

Graph to store your security data?

2
Comments
1 min read
Phishing campaign for tricking Booking.com's users and sharing malware.

Phishing campaign for tricking Booking.com's users and sharing malware.

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.