DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

5
Comments
2 min read
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

8
Comments
3 min read
How to protect yourself against cyber threats

How to protect yourself against cyber threats

Comments
3 min read
How to Create Secure and Scalable Web Applications with MERN

How to Create Secure and Scalable Web Applications with MERN

Comments
3 min read
Cybersecurity Certifications: Your Guide to a Successful Career

Cybersecurity Certifications: Your Guide to a Successful Career

Comments
2 min read
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Comments
3 min read
2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

6
Comments
1 min read
Prevent Session Replay Attacks in Laravel: A Complete Guide

Prevent Session Replay Attacks in Laravel: A Complete Guide

3
Comments
4 min read
BlackClown : AI-Assisted Tools for RCE Vulnerability Test, Discovery & Exploitation

BlackClown : AI-Assisted Tools for RCE Vulnerability Test, Discovery & Exploitation

Comments
2 min read
Hardware Entropy: The Hidden Foundation of Modern Cryptography

Hardware Entropy: The Hidden Foundation of Modern Cryptography

1
Comments
5 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
Importance of Regular Security Audits for Compliance and Cyber Resilience

Importance of Regular Security Audits for Compliance and Cyber Resilience

Comments
4 min read
Ethical WiFi Hacking with Termux: A Guide to Wipwn

Ethical WiFi Hacking with Termux: A Guide to Wipwn

Comments
3 min read
Dog Hack the Box Writeup

Dog Hack the Box Writeup

4
Comments 1
3 min read
The High Cost of Trust: How Data Breaches Damage Healthcare Organizations

The High Cost of Trust: How Data Breaches Damage Healthcare Organizations

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.