DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🕵️‍♀️ Nmap & Scapy on Kali: A Beginner-Friendly Packet Adventure

🕵️‍♀️ Nmap & Scapy on Kali: A Beginner-Friendly Packet Adventure

Comments
16 min read
How to Store Critical Secrets for 100+ Years

How to Store Critical Secrets for 100+ Years

1
Comments 2
3 min read
Networking for Cybersecurity (Part 4): Packets, Sniffing & Traffic Analysis

Networking for Cybersecurity (Part 4): Packets, Sniffing & Traffic Analysis

Comments
10 min read
How to Integrate SafeLine WAF with Ingress-Nginx in Kubernetes

How to Integrate SafeLine WAF with Ingress-Nginx in Kubernetes

Comments
2 min read
FinTech Security Testing Costs Simplified: A Practical Breakdown

FinTech Security Testing Costs Simplified: A Practical Breakdown

Comments
4 min read
🎭 Slopsquatting: The Supply Chain Attack Hiding in Plain Sight

🎭 Slopsquatting: The Supply Chain Attack Hiding in Plain Sight

Comments
1 min read
Why SafeLine is better than traditional WAF

Why SafeLine is better than traditional WAF

Comments
4 min read
How Cutting-Edge Technology Shapes Today’s Crypto Trading Platforms

How Cutting-Edge Technology Shapes Today’s Crypto Trading Platforms

Comments
5 min read
Networking for Cybersecurity (Part 5): Scanning, Enumeration & Fingerprinting

Networking for Cybersecurity (Part 5): Scanning, Enumeration & Fingerprinting

Comments
12 min read
HPSR Proxy Stack: Tu Propio Servidor Proxy HTTPS con Docker, Squid y Certificados SSL Válidos

HPSR Proxy Stack: Tu Propio Servidor Proxy HTTPS con Docker, Squid y Certificados SSL Válidos

Comments
8 min read
What I Learned While Investigating Industrial Security Across Solar and BESS Sites

What I Learned While Investigating Industrial Security Across Solar and BESS Sites

Comments
6 min read
Networking for Cybersecurity (Part 1): OSI, TCP/IP, Ports & Protocols

Networking for Cybersecurity (Part 1): OSI, TCP/IP, Ports & Protocols

Comments
9 min read
Eksploitasi Web Laravel dan Antisipasinya

Eksploitasi Web Laravel dan Antisipasinya

Comments
24 min read
SafeLine: A Next-Generation Self-Hosted Web Application Firewall

SafeLine: A Next-Generation Self-Hosted Web Application Firewall

Comments
5 min read
Outil de Cybersécurité du Jour - Nov 6, 2025

Outil de Cybersécurité du Jour - Nov 6, 2025

Comments
2 min read
Understanding SIEM: Security Information and Event Management

Understanding SIEM: Security Information and Event Management

1
Comments
10 min read
React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)

React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)

2
Comments
9 min read
Networking for Cybersecurity (Part 3): Firewalls, VPNs & Proxies

Networking for Cybersecurity (Part 3): Firewalls, VPNs & Proxies

Comments
7 min read
🛡️ Suraksha Mirage: Building a Real-Time Cybersecurity Honeypot Dashboard

🛡️ Suraksha Mirage: Building a Real-Time Cybersecurity Honeypot Dashboard

Comments
2 min read
🧪 HexSpeak — The Language That Turns Hex Into readable “Magic Words”

🧪 HexSpeak — The Language That Turns Hex Into readable “Magic Words”

Comments
2 min read
React2Shell: CVE-2025-55182 | TryHackMe Write-Up

React2Shell: CVE-2025-55182 | TryHackMe Write-Up

1
Comments
4 min read
Why You Shouldn’t Rely Solely on Detectors

Why You Shouldn’t Rely Solely on Detectors

Comments
2 min read
Why Battery Energy Storage Systems Are Security Nightmares From a Maintenance Technician's Perspective

Why Battery Energy Storage Systems Are Security Nightmares From a Maintenance Technician's Perspective

Comments
7 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
Why Multi-Validator Hosts Break Traditional Security Scanning

Why Multi-Validator Hosts Break Traditional Security Scanning

Comments
4 min read
loading...