DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Configuring CSP nonce for nginx 1.28 on Ubuntu 24 LTS using NJS

Configuring CSP nonce for nginx 1.28 on Ubuntu 24 LTS using NJS

Comments
3 min read
The Cybersecurity Industry Has Created Its Own Monster

The Cybersecurity Industry Has Created Its Own Monster

Comments
5 min read
Security and Systems: Inside the Toolbox of Professional Hackers! 🧰

Security and Systems: Inside the Toolbox of Professional Hackers! 🧰

5
Comments
11 min read
Web3's Original Sin: Why "Trustless" Systems Can't Escape Centralized Access Points

Web3's Original Sin: Why "Trustless" Systems Can't Escape Centralized Access Points

Comments
6 min read
Trademarks Are a Security Problem, Not Just a Legal One

Trademarks Are a Security Problem, Not Just a Legal One

Comments
3 min read
The Importance of Cybersecurity

The Importance of Cybersecurity

Comments
2 min read
I Built a Security Tool at 2 AM Because Copy-Pasting Commands 50 Times Isn't Learning

I Built a Security Tool at 2 AM Because Copy-Pasting Commands 50 Times Isn't Learning

Comments
6 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
Black‑Box Web Vulnerability Testing (Nikto, SQL Injection, XSS)

Black‑Box Web Vulnerability Testing (Nikto, SQL Injection, XSS)

Comments
4 min read
7 Urgent Fixes: Fortinet SAML Auth Bypass

7 Urgent Fixes: Fortinet SAML Auth Bypass

2
Comments
6 min read
It's Not About Replacing Code Security, It’s About Holding the Line Until Your Code Is Ready

It's Not About Replacing Code Security, It’s About Holding the Line Until Your Code Is Ready

Comments
4 min read
SafeLine: Advanced Open-Source WAF for Modern Web Applications

SafeLine: Advanced Open-Source WAF for Modern Web Applications

Comments
5 min read
Identity Threats in AI-Driven Security: Synthetic Personas and AI-Powered Deception

Identity Threats in AI-Driven Security: Synthetic Personas and AI-Powered Deception

Comments
5 min read
Securing React Application

Securing React Application

Comments
1 min read
SafeLine: The Open-Source WAF That Protects Your Web Applications from Every Angle

SafeLine: The Open-Source WAF That Protects Your Web Applications from Every Angle

Comments 1
4 min read
How SafeLine WAF Protected a Small Logistics Company’s Website from Cyber Attacks

How SafeLine WAF Protected a Small Logistics Company’s Website from Cyber Attacks

Comments
5 min read
The Federal Government Needs a Technical Bankruptcy, Not Another Security Patch

The Federal Government Needs a Technical Bankruptcy, Not Another Security Patch

Comments
6 min read
Outil de Cybersécurité du Jour - Dec 28, 2025

Outil de Cybersécurité du Jour - Dec 28, 2025

Comments
3 min read
TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis

TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis

Comments
3 min read
Securing LLMs with Secret Knowledge Defenses

Securing LLMs with Secret Knowledge Defenses

5
Comments
4 min read
The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back

The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back

Comments
4 min read
Complete MITRE ATT&CK MCP Server

Complete MITRE ATT&CK MCP Server

Comments
5 min read
5 Critical AI Agent Security Threats Developers Need to Know for 2026

5 Critical AI Agent Security Threats Developers Need to Know for 2026

5
Comments
4 min read
The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers

The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers

Comments
6 min read
LanManVan: My Journey Building a Modular Security Framework in Go

LanManVan: My Journey Building a Modular Security Framework in Go

5
Comments
2 min read
loading...