DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Mobile Application Security Testing

Mobile Application Security Testing

Comments
3 min read
What Legal Firms Need to Know About the Cloud: Friendly Tips for Using Cloud Technology in Your Legal Practice

What Legal Firms Need to Know About the Cloud: Friendly Tips for Using Cloud Technology in Your Legal Practice

1
Comments
5 min read
How to future-proof your web app's password authentication

How to future-proof your web app's password authentication

1
Comments
5 min read
#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

1
Comments
5 min read
How Small Businesses Can Implement Enterprise-Grade Security

How Small Businesses Can Implement Enterprise-Grade Security

Comments
4 min read
How to Maintain Compliance and Security in Finance

How to Maintain Compliance and Security in Finance

Comments
2 min read
Stop Scripting, Start Automating: A Developer's Guide to a Smarter ITSM

Stop Scripting, Start Automating: A Developer's Guide to a Smarter ITSM

Comments
2 min read
Apache RocketMQ RCE (CVE-2023-37582): Are Your Servers Still Exposed?

Apache RocketMQ RCE (CVE-2023-37582): Are Your Servers Still Exposed?

6
Comments
3 min read
#DAY 3 - Monitoring Internal Services: FTP & SSH

#DAY 3 - Monitoring Internal Services: FTP & SSH

1
Comments
3 min read
The Hidden Dangers of Overlooking Digital Hygiene in 2025

The Hidden Dangers of Overlooking Digital Hygiene in 2025

1
Comments
2 min read
The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

Comments
7 min read
Isn’t OSINT Just Glorified Googling?

Isn’t OSINT Just Glorified Googling?

1
Comments
2 min read
How to Block Censys Scans with SafeLine WAF

How to Block Censys Scans with SafeLine WAF

6
Comments
2 min read
The SharePoint exploit that breached U.S. Nuke Systems (and why devs should care)

The SharePoint exploit that breached U.S. Nuke Systems (and why devs should care)

1
Comments
54 min read
Blocking Suspected DDoS IPs with SafeLine WAF

Blocking Suspected DDoS IPs with SafeLine WAF

6
Comments
2 min read
CVE-2023-42820: JumpServer Password Reset Bug Could Lead to Account Takeover

CVE-2023-42820: JumpServer Password Reset Bug Could Lead to Account Takeover

6
Comments
2 min read
The Most Shocking Data Breaches of 2025: A Rundown

The Most Shocking Data Breaches of 2025: A Rundown

2
Comments
2 min read
#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

1
Comments
2 min read
From SOC‑CERT Winner to Live Dashboard: KendoReact + Real Cohere AI in Action

From SOC‑CERT Winner to Live Dashboard: KendoReact + Real Cohere AI in Action

8
Comments
1 min read
🕵️‍♂️ IoT Nightmare – How Smart Devices Spy on You

🕵️‍♂️ IoT Nightmare – How Smart Devices Spy on You

1
Comments
3 min read
LoLBins

LoLBins

1
Comments
6 min read
Use ZoomEye to find Jupyter servers without identity verification enabled

Use ZoomEye to find Jupyter servers without identity verification enabled

Comments
6 min read
Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

47
Comments 21
4 min read
DO NOT AUTOSCALE : PBCTF RCA

DO NOT AUTOSCALE : PBCTF RCA

21
Comments
4 min read
The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

20
Comments 4
4 min read
loading...