DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
decoy-hunter — Countering the "All Ports Are Open" Deception Author: Antonio José Socorro Marín Date: September 28, 2025

decoy-hunter — Countering the "All Ports Are Open" Deception Author: Antonio José Socorro Marín Date: September 28, 2025

1
Comments
5 min read
#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

1
Comments
5 min read
How Small Businesses Can Implement Enterprise-Grade Security

How Small Businesses Can Implement Enterprise-Grade Security

Comments
4 min read
#DAY 3 - Monitoring Internal Services: FTP & SSH

#DAY 3 - Monitoring Internal Services: FTP & SSH

1
Comments
3 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

Comments
7 min read
Isn’t OSINT Just Glorified Googling?

Isn’t OSINT Just Glorified Googling?

1
Comments
2 min read
How to Block Censys Scans with SafeLine WAF

How to Block Censys Scans with SafeLine WAF

6
Comments
2 min read
Blocking Suspected DDoS IPs with SafeLine WAF

Blocking Suspected DDoS IPs with SafeLine WAF

6
Comments
2 min read
The SharePoint exploit that breached U.S. Nuke Systems (and why devs should care)

The SharePoint exploit that breached U.S. Nuke Systems (and why devs should care)

1
Comments
54 min read
How I Restored a WordPress Site After a 53,000+ File Slot Gambling Malware Attack

How I Restored a WordPress Site After a 53,000+ File Slot Gambling Malware Attack

Comments
3 min read
CVE-2023-42820: JumpServer Password Reset Bug Could Lead to Account Takeover

CVE-2023-42820: JumpServer Password Reset Bug Could Lead to Account Takeover

6
Comments
2 min read
The Most Shocking Data Breaches of 2025: A Rundown

The Most Shocking Data Breaches of 2025: A Rundown

2
Comments
2 min read
#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

1
Comments
2 min read
From SOC‑CERT Winner to Live Dashboard: KendoReact + Real Cohere AI in Action

From SOC‑CERT Winner to Live Dashboard: KendoReact + Real Cohere AI in Action

8
Comments
1 min read
🕵️‍♂️ IoT Nightmare – How Smart Devices Spy on You

🕵️‍♂️ IoT Nightmare – How Smart Devices Spy on You

1
Comments
3 min read
LoLBins

LoLBins

1
Comments
6 min read
Use ZoomEye to find Jupyter servers without identity verification enabled

Use ZoomEye to find Jupyter servers without identity verification enabled

Comments
6 min read
Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

47
Comments 21
4 min read
The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

20
Comments 4
4 min read
DO NOT AUTOSCALE : PBCTF RCA

DO NOT AUTOSCALE : PBCTF RCA

21
Comments
4 min read
#DAY 1: Docker & Core Concepts

#DAY 1: Docker & Core Concepts

2
Comments
2 min read
Preventing OAuth Device Flow Attacks: Technical Strategies for Enterprise Developers

Preventing OAuth Device Flow Attacks: Technical Strategies for Enterprise Developers

1
Comments
3 min read
#Pre-DAY 1: Laying the Foundation: Docker & Concepts

#Pre-DAY 1: Laying the Foundation: Docker & Concepts

1
Comments
3 min read
🌐 IP Addressing: The Cities & Houses of the Internet

🌐 IP Addressing: The Cities & Houses of the Internet

Comments
3 min read
loading...