DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
A Weekend Exploring the World of Hackers, Scammers, and Online Deception

A Weekend Exploring the World of Hackers, Scammers, and Online Deception

1
Comments
5 min read
đź’ˇ The Hidden Cost of Trusting Default Security Po

đź’ˇ The Hidden Cost of Trusting Default Security Po

1
Comments
4 min read
Week 1 – Linux User and Group Management

Week 1 – Linux User and Group Management

Comments 1
1 min read
[EP.01] XSS Attack Explained — How Hackers Steal Sessions Without Your Password

[EP.01] XSS Attack Explained — How Hackers Steal Sessions Without Your Password

3
Comments
2 min read
SurfaceLens V2 — Infrastructure Attack Surface & Shadow IT Intelligence Engine by Rugero Tesla (404saint)

SurfaceLens V2 — Infrastructure Attack Surface & Shadow IT Intelligence Engine by Rugero Tesla (404saint)

11
Comments
3 min read
An AI Found a 27-Year-Old Bug in OpenBSD- The Most Security-Hardened OS on Earth

An AI Found a 27-Year-Old Bug in OpenBSD- The Most Security-Hardened OS on Earth

1
Comments
8 min read
Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes

Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes

Comments
6 min read
Why Supply Chain Security Fails in the Real World

Why Supply Chain Security Fails in the Real World

Comments
7 min read
When Proxies Become the Attack Vectors in Web Architectures

When Proxies Become the Attack Vectors in Web Architectures

1
Comments
5 min read
TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

Comments
5 min read
Day 18: The Danger of Wildcards (*) & Library Injection 🕵️‍♂️

Day 18: The Danger of Wildcards (*) & Library Injection 🕵️‍♂️

1
Comments
1 min read
Title: Securing AI Agents: Why I Built a Pre-Execution Scanner for MCP & LangChain

Title: Securing AI Agents: Why I Built a Pre-Execution Scanner for MCP & LangChain

Comments
3 min read
Understanding Web Shell Attacks

Understanding Web Shell Attacks

1
Comments
4 min read
How I Built a Phishing Email Analyzer That Scores Risk 0–100

How I Built a Phishing Email Analyzer That Scores Risk 0–100

Comments
4 min read
Day 27: Lateral Movement Strategy — Why Credentials Trump Pivoting 🕵️‍♂️

Day 27: Lateral Movement Strategy — Why Credentials Trump Pivoting 🕵️‍♂️

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.