DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Your MQTT Client in C# with Basic Authentication

Secure Your MQTT Client in C# with Basic Authentication

1
Comments
1 min read
Protege tu cliente MQTT en C# con autenticación básica

Protege tu cliente MQTT en C# con autenticación básica

Comments
2 min read
Would you like to be a movie star by contributing to open source?

Would you like to be a movie star by contributing to open source?

1
Comments
2 min read
Deploying SafeLine WAF on Kubernetes: A Beginner-Friendly Guide

Deploying SafeLine WAF on Kubernetes: A Beginner-Friendly Guide

5
Comments
3 min read
TryHackMe Pickle Rick Walkthrough | Complete Beginner’s Guide

TryHackMe Pickle Rick Walkthrough | Complete Beginner’s Guide

1
Comments
4 min read
How to become a “HACKER”

How to become a “HACKER”

1
Comments
2 min read
Mastering Input Filtering in PHP: A Guide to `filter_input` Techniques

Mastering Input Filtering in PHP: A Guide to `filter_input` Techniques

1
Comments
2 min read
What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

3
Comments 2
5 min read
Beyond CVE: Building a Complete Vulnerability Intelligence Pipeline

Beyond CVE: Building a Complete Vulnerability Intelligence Pipeline

1
Comments
4 min read
The Lazarus Hackers: Everything You Know Is a Lie

The Lazarus Hackers: Everything You Know Is a Lie

6
Comments
5 min read
Creating a resource group and a storage account on Azure for beginners.

Creating a resource group and a storage account on Azure for beginners.

5
Comments
2 min read
# How to Investigate a Compromised Linux Server

# How to Investigate a Compromised Linux Server

11
Comments
12 min read
AI Can "Guess" Base64 Encoding - And That Changes Everything

AI Can "Guess" Base64 Encoding - And That Changes Everything

19
Comments 31
3 min read
Tech Debt Is Real: The Internet Runs on 30-Year-Old Code

Tech Debt Is Real: The Internet Runs on 30-Year-Old Code

Comments 1
4 min read
A Complete Overview of Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)

A Complete Overview of Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)

1
Comments 2
11 min read
🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL

🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL

Comments
3 min read
Recovering a Flag from an RDP Cache

Recovering a Flag from an RDP Cache

1
Comments
3 min read
ModSecurity vs SafeLine: Why Not Use Both? (Part 1)

ModSecurity vs SafeLine: Why Not Use Both? (Part 1)

6
Comments
5 min read
Resillion — when those who preach cybersecurity forget to practice it

Resillion — when those who preach cybersecurity forget to practice it

1
Comments
5 min read
Top-tier hacker groups don’t steal — they earn from the CFO

Top-tier hacker groups don’t steal — they earn from the CFO

1
Comments
5 min read
Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)

Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)

2
Comments
3 min read
SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?

SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?

1
Comments
3 min read
Interview With Author Ahmed Awad ( NullC0d3 )

Interview With Author Ahmed Awad ( NullC0d3 )

1
Comments
3 min read
Think Like a Threat: How SOC Teams Can Stop Attacks Before the First Alert

Think Like a Threat: How SOC Teams Can Stop Attacks Before the First Alert

Comments 2
2 min read
🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

1
Comments
1 min read
loading...