DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
how to make the world's simplest malware in C

how to make the world's simplest malware in C

5
Comments 1
1 min read
simple python IP pinger

simple python IP pinger

2
Comments
2 min read
Guide pratique pour sécuriser votre PME contre les cybermenaces

Guide pratique pour sécuriser votre PME contre les cybermenaces

Comments
1 min read
Weekly #33-2025:Patch Tuesday, AI & Careers, Core Fundamentals, Cloud Era

Weekly #33-2025:Patch Tuesday, AI & Careers, Core Fundamentals, Cloud Era

Comments 1
5 min read
Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

1
Comments
1 min read
5 Ways IoT Is Changing the Way Vending Machines Work

5 Ways IoT Is Changing the Way Vending Machines Work

Comments
3 min read
Qu'est-ce qu'une attaque par prompt injection?

Qu'est-ce qu'une attaque par prompt injection?

2
Comments
1 min read
Choosing the Right Performance Mode in SafeLine

Choosing the Right Performance Mode in SafeLine

5
Comments
1 min read
How I Caught an MPESA API Leak Hiding in Plain Sight

How I Caught an MPESA API Leak Hiding in Plain Sight

2
Comments
2 min read
10 Best Platforms to Learn Cybersecurity Courses in 2025

10 Best Platforms to Learn Cybersecurity Courses in 2025

2
Comments
5 min read
Application Penetration Testing: Why Your Web and Mobile Apps Need a Security Checkup

Application Penetration Testing: Why Your Web and Mobile Apps Need a Security Checkup

1
Comments
2 min read
ICMP Spoofing with Scapy: Responding to Pings as a Fake IP

ICMP Spoofing with Scapy: Responding to Pings as a Fake IP

1
Comments
2 min read
AI Powered Honeypot

AI Powered Honeypot

Comments
2 min read
Host Your Own Web Firewall with SafeLine — No Cloud Needed

Host Your Own Web Firewall with SafeLine — No Cloud Needed

8
Comments
2 min read
Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Comments
4 min read
Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

6
Comments
2 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Comments
1 min read
What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

2
Comments
2 min read
I got 99 problems, but a breach ain’t one

I got 99 problems, but a breach ain’t one

1
Comments
5 min read
OAuth Misconfiguration in Symfony Explained

OAuth Misconfiguration in Symfony Explained

3
Comments
3 min read
Future proofing your platform

Future proofing your platform

1
Comments
5 min read
Built-In Rate Limiting in SafeLine WAF: What You Need to Know

Built-In Rate Limiting in SafeLine WAF: What You Need to Know

6
Comments
3 min read
SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

6
Comments
2 min read
🛡️ Cybersecurity Review Guide for React & Vite Applications

🛡️ Cybersecurity Review Guide for React & Vite Applications

Comments
2 min read
Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

1
Comments
2 min read
loading...