DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Hidden Power of 127.0.0.1: Why the Loopback Address is More Than Just “Localhost”

The Hidden Power of 127.0.0.1: Why the Loopback Address is More Than Just “Localhost”

2
Comments
3 min read
ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

1
Comments
2 min read
CEH vs OSCP: Which Cybersecurity Certification is Right for You?

CEH vs OSCP: Which Cybersecurity Certification is Right for You?

2
Comments
3 min read
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

1
Comments
3 min read
📡 Diving into Nmap: Exploring Traffic with Wireshark

📡 Diving into Nmap: Exploring Traffic with Wireshark

1
Comments
1 min read
Protect Your Website in 3 Minutes with SafeLine: An Open-Source WAF with 17.3K GitHub Stars

Protect Your Website in 3 Minutes with SafeLine: An Open-Source WAF with 17.3K GitHub Stars

6
Comments
2 min read
ECScape Flaw in Amazon ECS Allows Credential Theft

ECScape Flaw in Amazon ECS Allows Credential Theft

1
Comments
1 min read
SafeLine vs Cloudbric: Smarter WAF Engines, Smarter Protection?

SafeLine vs Cloudbric: Smarter WAF Engines, Smarter Protection?

6
Comments
2 min read
Stop Session Replay Attacks in Symfony Apps

Stop Session Replay Attacks in Symfony Apps

3
Comments
3 min read
Security Briefing: Security Flaw Analysis

Security Briefing: Security Flaw Analysis

2
Comments
3 min read
Threat Advisory: Security Flaw Defense

Threat Advisory: Security Flaw Defense

1
Comments
1 min read
Threat Intelligence: Security Flaw Exploitation

Threat Intelligence: Security Flaw Exploitation

1
Comments
1 min read
Critical Security Flaw: Security Flaw Techniques

Critical Security Flaw: Security Flaw Techniques

1
Comments
1 min read
Security Analysis: None

Security Analysis: None

1
Comments
3 min read
Chromium XXE Flaw Exposes Local Files (CVE-2023-4357)

Chromium XXE Flaw Exposes Local Files (CVE-2023-4357)

7
Comments
3 min read
Blockchain and Cryptocurrency Security: DeFi Protocol Analysis

Blockchain and Cryptocurrency Security: DeFi Protocol Analysis

3
Comments 5
3 min read
⚠️ The Hidden Dangers of Using Public Wi-Fi: What You Need to Know

⚠️ The Hidden Dangers of Using Public Wi-Fi: What You Need to Know

Comments
1 min read
🚀 Learn Ethical Hacking — 001

🚀 Learn Ethical Hacking — 001

5
Comments
2 min read
Ever Wondered What Happens When You Click “Send”?

Ever Wondered What Happens When You Click “Send”?

2
Comments
3 min read
Why Technical Cybersecurity Founders Struggle with Marketing (and How AI Is Changing the Game)

Why Technical Cybersecurity Founders Struggle with Marketing (and How AI Is Changing the Game)

Comments
5 min read
Not All Wi-Fi Is Visible: How Bands Limit What Your Adapter Detects

Not All Wi-Fi Is Visible: How Bands Limit What Your Adapter Detects

5
Comments
3 min read
Trend Micro Apex One Flaws Actively Exploited

Trend Micro Apex One Flaws Actively Exploited

1
Comments
1 min read
OWASP Cornucopia Companion Edition

OWASP Cornucopia Companion Edition

3
Comments
2 min read
Built an IP Sweeper in Bash to Check Live Hosts on a /24 Network

Built an IP Sweeper in Bash to Check Live Hosts on a /24 Network

Comments
4 min read
CVE-2022-40139: Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability

CVE-2022-40139: Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability

1
Comments
1 min read
loading...