DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SafeLine: A Next-Generation Self-Hosted Web Application Firewall

SafeLine: A Next-Generation Self-Hosted Web Application Firewall

Comments
5 min read
Outil de Cybersécurité du Jour - Nov 6, 2025

Outil de Cybersécurité du Jour - Nov 6, 2025

Comments
2 min read
Understanding SIEM: Security Information and Event Management

Understanding SIEM: Security Information and Event Management

1
Comments
10 min read
React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)

React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)

2
Comments
9 min read
Networking for Cybersecurity (Part 3): Firewalls, VPNs & Proxies

Networking for Cybersecurity (Part 3): Firewalls, VPNs & Proxies

Comments
7 min read
🛡️ Suraksha Mirage: Building a Real-Time Cybersecurity Honeypot Dashboard

🛡️ Suraksha Mirage: Building a Real-Time Cybersecurity Honeypot Dashboard

Comments
2 min read
🧪 HexSpeak — The Language That Turns Hex Into readable “Magic Words”

🧪 HexSpeak — The Language That Turns Hex Into readable “Magic Words”

Comments
2 min read
React2Shell: CVE-2025-55182 | TryHackMe Write-Up

React2Shell: CVE-2025-55182 | TryHackMe Write-Up

1
Comments
4 min read
Why You Shouldn’t Rely Solely on Detectors

Why You Shouldn’t Rely Solely on Detectors

Comments
2 min read
Why Battery Energy Storage Systems Are Security Nightmares From a Maintenance Technician's Perspective

Why Battery Energy Storage Systems Are Security Nightmares From a Maintenance Technician's Perspective

Comments
7 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
Why Multi-Validator Hosts Break Traditional Security Scanning

Why Multi-Validator Hosts Break Traditional Security Scanning

Comments
4 min read
Advent of Cyber 2025: Day 4 Writeup AI-AI-AI | TryHackMe

Advent of Cyber 2025: Day 4 Writeup AI-AI-AI | TryHackMe

Comments
2 min read
Keyshade Debugging: Mastering Workspace Role Tests and API Repair

Keyshade Debugging: Mastering Workspace Role Tests and API Repair

1
Comments
21 min read
Coordinated Burst Activity Report

Coordinated Burst Activity Report

Comments
4 min read
Networking for Cybersecurity (Part 2): DNS, Routing & How the Internet Works

Networking for Cybersecurity (Part 2): DNS, Routing & How the Internet Works

Comments
10 min read
Migrating from Cloud WAF to Self-Hosted SafeLine: A Practical Guide

Migrating from Cloud WAF to Self-Hosted SafeLine: A Practical Guide

10
Comments
3 min read
THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

16
Comments
5 min read
2026 Red Team - Kendi Hacking Araçlarımızı Yazmayı Öğreniyoruz

2026 Red Team - Kendi Hacking Araçlarımızı Yazmayı Öğreniyoruz

Comments
1 min read
Ransomware 2025: What’s New and How to Stay Protected

Ransomware 2025: What’s New and How to Stay Protected

5
Comments
5 min read
Directory Traversal Attacks

Directory Traversal Attacks

Comments
5 min read
When Oracle Got Hacked (and the Hackers Fought Each Other)

When Oracle Got Hacked (and the Hackers Fought Each Other)

Comments
42 min read
A Deep Cybersecurity View of Encryption

A Deep Cybersecurity View of Encryption

Comments
7 min read
Wuzen 2025 Analysis: The Android RAT That's Raising the Bar for Mobile Security Threats

Wuzen 2025 Analysis: The Android RAT That's Raising the Bar for Mobile Security Threats

Comments
2 min read
The Strategic Role of MSPs in Cybersecurity: What Developers and Tech Leads Should Know in 2025

The Strategic Role of MSPs in Cybersecurity: What Developers and Tech Leads Should Know in 2025

Comments
3 min read
loading...