DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

10
Comments
3 min read
Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

2
Comments
3 min read
[Fix] Burp Suite crashing on Kali ARM64 (Apple Silicon / QEMU)

[Fix] Burp Suite crashing on Kali ARM64 (Apple Silicon / QEMU)

Comments
1 min read
How to Secure Different User Types in Linux: A Guide for IT Teams

How to Secure Different User Types in Linux: A Guide for IT Teams

1
Comments
5 min read
Blackbird: The AI-Powered OSINT Account Enumeration Tool

Blackbird: The AI-Powered OSINT Account Enumeration Tool

3
Comments
2 min read
Security as Physics: Thinking About Networks Like Energy Systems

Security as Physics: Thinking About Networks Like Energy Systems

1
Comments
2 min read
WordPress Hacked: Fake Cloudflare “Verify You Are Human” — A WordPress Malware Removal Case Study

WordPress Hacked: Fake Cloudflare “Verify You Are Human” — A WordPress Malware Removal Case Study

Comments
5 min read
Assinatura Digital em Elixir com Criptografia Assimétrica

Assinatura Digital em Elixir com Criptografia Assimétrica

Comments
4 min read
The Hidden Dangers of Online PDF Editors and File Converters

The Hidden Dangers of Online PDF Editors and File Converters

Comments
6 min read
Cybersecurity Weekly #4 :Best Browsers for Privacy in 2025: Chrome vs Brave vs Firefox

Cybersecurity Weekly #4 :Best Browsers for Privacy in 2025: Chrome vs Brave vs Firefox

1
Comments 1
2 min read
Lessons from SocialBox: Modern Defenses Against Brute Force

Lessons from SocialBox: Modern Defenses Against Brute Force

1
Comments
4 min read
Why Brute Force Attacks Fail More Often Today

Why Brute Force Attacks Fail More Often Today

1
Comments
4 min read
Hardening Authentication: Practical Steps Beyond Passwords

Hardening Authentication: Practical Steps Beyond Passwords

1
Comments
4 min read
Man-in-the-Middle Attacks Explained (And How to Stay Safe)

Man-in-the-Middle Attacks Explained (And How to Stay Safe)

7
Comments
3 min read
Password Cracking Project #1 – From Privilege Escalation to Hashcat

Password Cracking Project #1 – From Privilege Escalation to Hashcat

5
Comments
1 min read
Improving Security with .NET Aspire

Improving Security with .NET Aspire

1
Comments
2 min read
Running VMs in the cloud:AWS Virtualization for Beginners

Running VMs in the cloud:AWS Virtualization for Beginners

2
Comments 1
2 min read
Element: The Open-Source Federated System for Secure Messaging, Voice, and Video

Element: The Open-Source Federated System for Secure Messaging, Voice, and Video

1
Comments
1 min read
Is SOC 2 Compliance Worth It? Here’s How It Transforms Your Company’s Future

Is SOC 2 Compliance Worth It? Here’s How It Transforms Your Company’s Future

Comments
4 min read
VulnHub - Hacksudo: Thor (Linux)

VulnHub - Hacksudo: Thor (Linux)

1
Comments
1 min read
Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)

5
Comments
2 min read
Yonyou U8 Cloud RCE: File Upload Bypass Confirmed

Yonyou U8 Cloud RCE: File Upload Bypass Confirmed

6
Comments
2 min read
Ataques DDoS e a urgência da prevenção digital

Ataques DDoS e a urgência da prevenção digital

Comments
2 min read
Hack The Box - Synced (rsync)

Hack The Box - Synced (rsync)

1
Comments
6 min read
10 Linux commands every Cloud Security Engineer should master

10 Linux commands every Cloud Security Engineer should master

1
Comments
3 min read
loading...