DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How I Hack a Hacker

How I Hack a Hacker

13
Comments
4 min read
🔐 AppArmor and ROS2 – The Article I Tried Not to Write

🔐 AppArmor and ROS2 – The Article I Tried Not to Write

Comments
4 min read
CVE-2024-49113: Windows LDAP Flaw Lets Hackers Crash Domain Controllers

CVE-2024-49113: Windows LDAP Flaw Lets Hackers Crash Domain Controllers

5
Comments
3 min read
The Real Breach Happens After the Login: How Privilege Escalation Fuels Cyber Attacks

The Real Breach Happens After the Login: How Privilege Escalation Fuels Cyber Attacks

Comments
1 min read
Mastering REST API Authentication: A Developer's Security Handbook

Mastering REST API Authentication: A Developer's Security Handbook

Comments
4 min read
What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know

What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know

1
Comments 1
4 min read
Cipher's Log: Introduction

Cipher's Log: Introduction

Comments
2 min read
The Telegram Username Scam: How People Are Losing Thousands in TON

The Telegram Username Scam: How People Are Losing Thousands in TON

10
Comments 9
7 min read
CVE-2016-10033: PHPMailer Command Injection Vulnerability

CVE-2016-10033: PHPMailer Command Injection Vulnerability

1
Comments
1 min read
CVE-2019-5418: Rails Ruby on Rails Path Traversal Vulnerability

CVE-2019-5418: Rails Ruby on Rails Path Traversal Vulnerability

1
Comments
1 min read
The 4 Problems Every AI Agent Developer Faces (And Our Live Solution)

The 4 Problems Every AI Agent Developer Faces (And Our Live Solution)

1
Comments
6 min read
Sending Email Notifications on SSH Login Events

Sending Email Notifications on SSH Login Events

Comments
2 min read
The Chain of Trust in X.500 Digital Certificates: Power, Control, and Real-World Failures

The Chain of Trust in X.500 Digital Certificates: Power, Control, and Real-World Failures

Comments
9 min read
Implementing Multi-Factor Authentication in Azure

Implementing Multi-Factor Authentication in Azure

1
Comments
5 min read
Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Comments
4 min read
The Scariest Threat in Cybersecurity? It Might Be the Person Sitting Next to You

The Scariest Threat in Cybersecurity? It Might Be the Person Sitting Next to You

1
Comments
3 min read
Inside the Hacker’s Mindset: How Thinking Like an Attacker Strengthens Your Defense

Inside the Hacker’s Mindset: How Thinking Like an Attacker Strengthens Your Defense

Comments
2 min read
Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Comments
2 min read
Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Comments
2 min read
Best Practices for Creating Strong and Secure Passwords

Best Practices for Creating Strong and Secure Passwords

Comments
4 min read
🛡️ 10 Must-Have Cybersecurity Tools for Freelance Developers in 2025 (Free + Paid)

🛡️ 10 Must-Have Cybersecurity Tools for Freelance Developers in 2025 (Free + Paid)

1
Comments
2 min read
Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Comments
2 min read
Hydra Hands-On: Exploiting Telnet & Attacking FTP Services for Password Cracking

Hydra Hands-On: Exploiting Telnet & Attacking FTP Services for Password Cracking

Comments
3 min read
PIPEDA Compliance and Data Security: A Practical Guide for Canadians

PIPEDA Compliance and Data Security: A Practical Guide for Canadians

Comments
3 min read
My First Post

My First Post

Comments
1 min read
loading...