DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Lab Setup: Using SOCKS Proxies, ProxyChains, and SSH Dynamic Port Forwarding

Lab Setup: Using SOCKS Proxies, ProxyChains, and SSH Dynamic Port Forwarding

1
Comments
2 min read
KDE Gear 25.08 Released with Key Improvements

KDE Gear 25.08 Released with Key Improvements

1
Comments
1 min read
Boring Cybersecurity Theory: Security Domains From CISSP

Boring Cybersecurity Theory: Security Domains From CISSP

1
Comments
5 min read
Making a Browser That Slips Past WiFi Captive Portals — and Why This Loophole Isn’t Worth It

Making a Browser That Slips Past WiFi Captive Portals — and Why This Loophole Isn’t Worth It

4
Comments
5 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

2
Comments
13 min read
Boring Cybersecurity Theory: Where it all began

Boring Cybersecurity Theory: Where it all began

1
Comments
5 min read
Boring Cybersecurity Theory: Risk Management

Boring Cybersecurity Theory: Risk Management

1
Comments
8 min read
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)

Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)

1
Comments
3 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)

Boring Cybersecurity Theory: Hats (Understand Attackers)

1
Comments
5 min read
📞 WhatsApp Missed Call Scam — The Call You Should Never Return

📞 WhatsApp Missed Call Scam — The Call You Should Never Return

4
Comments 1
4 min read
🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

1
Comments
3 min read
Breaking into Appsec/Devsecops without being a developer: Complete roadmap

Breaking into Appsec/Devsecops without being a developer: Complete roadmap

2
Comments
3 min read
Critical GeoServer RCE Vulnerability (CVE-2024-36401) — No Auth Needed

Critical GeoServer RCE Vulnerability (CVE-2024-36401) — No Auth Needed

6
Comments
3 min read
Beware: ChatGPT Could Be Attacking You!

Beware: ChatGPT Could Be Attacking You!

3
Comments 2
5 min read
How WAFs Work + One You Should Try

How WAFs Work + One You Should Try

5
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.