DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Attacking Phase: Where Hackers Thrive and Defenders Sleep

The Attacking Phase: Where Hackers Thrive and Defenders Sleep

2
Comments
2 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
OpenSSH RCE Vulnerability (CVE-2024-6387): What You Need to Know

OpenSSH RCE Vulnerability (CVE-2024-6387): What You Need to Know

5
Comments
2 min read
I Completed Cisco’s Networking Basics Course! Here’s Why It Matters

I Completed Cisco’s Networking Basics Course! Here’s Why It Matters

1
Comments
1 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
Claude, OpenAI, Google API Keys... All Public. This Is What I Found After Scanning GitHub at Scale

Claude, OpenAI, Google API Keys... All Public. This Is What I Found After Scanning GitHub at Scale

2
Comments 1
2 min read
Apache Tomcat RCE on Windows (CVE-2024-50379): Patch Now or Risk Remote Attacks

Apache Tomcat RCE on Windows (CVE-2024-50379): Patch Now or Risk Remote Attacks

6
Comments
3 min read
How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

10
Comments 2
6 min read
Africa’s Tech Boom Needs a Security Backbone — Not Just AI Hype

Africa’s Tech Boom Needs a Security Backbone — Not Just AI Hype

1
Comments
2 min read
🖼️ PixelSink: Hunt Hidden Data Inside Images

🖼️ PixelSink: Hunt Hidden Data Inside Images

1
Comments
1 min read
LANimals: Lightweight Open‑Source LAN toolkit for Hackers

LANimals: Lightweight Open‑Source LAN toolkit for Hackers

1
Comments
2 min read
I'm Building a "Copilot for Hackers", But I'm Forcing it to Be Dumb

I'm Building a "Copilot for Hackers", But I'm Forcing it to Be Dumb

1
Comments
3 min read
Unauthenticated SQL Injection Found in Weaver e-cology Platform

Unauthenticated SQL Injection Found in Weaver e-cology Platform

6
Comments
2 min read
XSS Attack Types Explained — and How SafeLine WAF Stops Them

XSS Attack Types Explained — and How SafeLine WAF Stops Them

6
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.