DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Boring Cybersecurity Theory: Frameworks (NIST)

Boring Cybersecurity Theory: Frameworks (NIST)

1
Comments
3 min read
Symmetric vs Asymmetric Encryption — Lessons from the Field

Symmetric vs Asymmetric Encryption — Lessons from the Field

1
Comments
2 min read
SafeLine WAF: Custom Rules, Attack Prevention, and Dashboard Insights

SafeLine WAF: Custom Rules, Attack Prevention, and Dashboard Insights

6
Comments
2 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
CVE-2023-50164: New Struts2 Upload Vulnerability Explained

CVE-2023-50164: New Struts2 Upload Vulnerability Explained

6
Comments
3 min read
SafeLine vs. BunkerWeb: Which Open Source WAF Is Right for You?

SafeLine vs. BunkerWeb: Which Open Source WAF Is Right for You?

6
Comments
3 min read
How to Get Real IPs Through FRP with SafeLine WAF

How to Get Real IPs Through FRP with SafeLine WAF

5
Comments
4 min read
Airodump-ng for Beginners: Scanning and Monitoring Wi-Fi Networks

Airodump-ng for Beginners: Scanning and Monitoring Wi-Fi Networks

10
Comments
4 min read
How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

49
Comments
4 min read
Creating a extremely secure hacker-proof system

Creating a extremely secure hacker-proof system

3
Comments
4 min read
Real-World SOCKS Proxy Use Cases for Cybersecurity and Network Administration

Real-World SOCKS Proxy Use Cases for Cybersecurity and Network Administration

1
Comments 2
5 min read
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance

Boring Cybersecurity Theory: Controls, Frameworks, and Compliance

1
Comments
6 min read
Lab Setup: Using SOCKS Proxies, ProxyChains, and SSH Dynamic Port Forwarding

Lab Setup: Using SOCKS Proxies, ProxyChains, and SSH Dynamic Port Forwarding

1
Comments
2 min read
Top Tools and Applications That Support SOCKS5 Proxies

Top Tools and Applications That Support SOCKS5 Proxies

3
Comments
5 min read
Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

1
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.