DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Maintain Compliance and Security in Finance

How to Maintain Compliance and Security in Finance

Comments
2 min read
Stop Scripting, Start Automating: A Developer's Guide to a Smarter ITSM

Stop Scripting, Start Automating: A Developer's Guide to a Smarter ITSM

Comments
2 min read
Apache RocketMQ RCE (CVE-2023-37582): Are Your Servers Still Exposed?

Apache RocketMQ RCE (CVE-2023-37582): Are Your Servers Still Exposed?

6
Comments
3 min read
#DAY 3 - Monitoring Internal Services: FTP & SSH

#DAY 3 - Monitoring Internal Services: FTP & SSH

1
Comments
3 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
The Hidden Dangers of Overlooking Digital Hygiene in 2025

The Hidden Dangers of Overlooking Digital Hygiene in 2025

1
Comments
2 min read
The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

Comments
7 min read
Isn’t OSINT Just Glorified Googling?

Isn’t OSINT Just Glorified Googling?

1
Comments
2 min read
How to Block Censys Scans with SafeLine WAF

How to Block Censys Scans with SafeLine WAF

6
Comments
2 min read
The SharePoint exploit that breached U.S. Nuke Systems (and why devs should care)

The SharePoint exploit that breached U.S. Nuke Systems (and why devs should care)

1
Comments
54 min read
Blocking Suspected DDoS IPs with SafeLine WAF

Blocking Suspected DDoS IPs with SafeLine WAF

6
Comments
2 min read
CVE-2023-42820: JumpServer Password Reset Bug Could Lead to Account Takeover

CVE-2023-42820: JumpServer Password Reset Bug Could Lead to Account Takeover

6
Comments
2 min read
The Most Shocking Data Breaches of 2025: A Rundown

The Most Shocking Data Breaches of 2025: A Rundown

2
Comments
2 min read
#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

1
Comments
2 min read
From SOC‑CERT Winner to Live Dashboard: KendoReact + Real Cohere AI in Action

From SOC‑CERT Winner to Live Dashboard: KendoReact + Real Cohere AI in Action

8
Comments
1 min read
🕵️‍♂️ IoT Nightmare – How Smart Devices Spy on You

🕵️‍♂️ IoT Nightmare – How Smart Devices Spy on You

1
Comments
3 min read
LoLBins

LoLBins

1
Comments
6 min read
Use ZoomEye to find Jupyter servers without identity verification enabled

Use ZoomEye to find Jupyter servers without identity verification enabled

Comments
6 min read
Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

47
Comments 21
4 min read
The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

20
Comments 4
4 min read
DO NOT AUTOSCALE : PBCTF RCA

DO NOT AUTOSCALE : PBCTF RCA

21
Comments
4 min read
#DAY 1: Docker & Core Concepts

#DAY 1: Docker & Core Concepts

2
Comments
2 min read
Preventing OAuth Device Flow Attacks: Technical Strategies for Enterprise Developers

Preventing OAuth Device Flow Attacks: Technical Strategies for Enterprise Developers

1
Comments
3 min read
#Pre-DAY 1: Laying the Foundation: Docker & Concepts

#Pre-DAY 1: Laying the Foundation: Docker & Concepts

1
Comments
3 min read
🌐 IP Addressing: The Cities & Houses of the Internet

🌐 IP Addressing: The Cities & Houses of the Internet

Comments
3 min read
loading...