DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

3
Comments
5 min read
Bypassing Web Application Firewalls

Bypassing Web Application Firewalls

3
Comments
5 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
Queen City Con 0x3: Hacking And Embracing Resiliency

Queen City Con 0x3: Hacking And Embracing Resiliency

Comments
8 min read
It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

Comments
5 min read
SafeLine: The Open-Source WAF That Actually Protects Your Web Apps

SafeLine: The Open-Source WAF That Actually Protects Your Web Apps

Comments
4 min read
Hands-On TLS: Inspect Certificates, Verify PFS, and Build a Local HTTPS Server

Hands-On TLS: Inspect Certificates, Verify PFS, and Build a Local HTTPS Server

9
Comments
2 min read
Why Identity Threat Detection & Response (ITDR) Is Becoming Essential in Modern Security

Why Identity Threat Detection & Response (ITDR) Is Becoming Essential in Modern Security

Comments
3 min read
How to Build India's Cheapest (Yet Most Effective) Penetration Testing Tool 🔥

How to Build India's Cheapest (Yet Most Effective) Penetration Testing Tool 🔥

Comments
7 min read
My Writeup (0day in Zsh (RCE))

My Writeup (0day in Zsh (RCE))

11
Comments 1
5 min read
Indirect Prompt Injection: The Sneaky AI Vulnerability You Need to Know

Indirect Prompt Injection: The Sneaky AI Vulnerability You Need to Know

5
Comments
5 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
Hands-On: See Image Metadata Removal in Action

Hands-On: See Image Metadata Removal in Action

120
Comments 2
6 min read
Why Some Android Games Resist Naïve Reverse Engineering

Why Some Android Games Resist Naïve Reverse Engineering

1
Comments 1
5 min read
🔐 Building an IAM Security Dashboard with Power BI (Beginner-Friendly Walkthrough)

🔐 Building an IAM Security Dashboard with Power BI (Beginner-Friendly Walkthrough)

1
Comments
7 min read
LiveShell — Interactive Reverse Shell Generator

LiveShell — Interactive Reverse Shell Generator

10
Comments 1
2 min read
I Built a Cybersecurity Programming Language in Go (Cyber+)

I Built a Cybersecurity Programming Language in Go (Cyber+)

Comments 1
1 min read
Secure Linux Server Setup & Application Deployment

Secure Linux Server Setup & Application Deployment

8
Comments 1
7 min read
🔐 Cryptol — The Language Designed Specifically for Cryptography and Security Proofs

🔐 Cryptol — The Language Designed Specifically for Cryptography and Security Proofs

Comments
2 min read
React2Shell (CVE-2025-55182): Turns Out, "Server Components" Are Actually Just Remote Code Execution As-A Service

React2Shell (CVE-2025-55182): Turns Out, "Server Components" Are Actually Just Remote Code Execution As-A Service

Comments
4 min read
Microsoft Purview no Ignite 2025: segurança de dados integrada para a era de IA e agentes

Microsoft Purview no Ignite 2025: segurança de dados integrada para a era de IA e agentes

1
Comments
6 min read
The Hidden Vulnerabilities in Your Authentication System: A Deep Dive into Timing Attacks, IP Spoofing, and Race Conditions

The Hidden Vulnerabilities in Your Authentication System: A Deep Dive into Timing Attacks, IP Spoofing, and Race Conditions

Comments
6 min read
Why Do Networks Even Work Correctly?

Why Do Networks Even Work Correctly?

Comments
3 min read
Securely Managing GitHub Access on Production Servers

Securely Managing GitHub Access on Production Servers

9
Comments
3 min read
I Checked Proton Mail’s Security… and I Was Not Ready for What I Saw 😳

I Checked Proton Mail’s Security… and I Was Not Ready for What I Saw 😳

Comments 3
1 min read
loading...