DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔎 CloakDetect: Revealing the Hidden Side of the Web

🔎 CloakDetect: Revealing the Hidden Side of the Web

1
Comments
1 min read
ん, and?

ん, and?

4
Comments
4 min read
Man-in-the-Middle (MITM) Attacks: Detection and Prevention Strategies

Man-in-the-Middle (MITM) Attacks: Detection and Prevention Strategies

1
Comments 1
2 min read
How Generative AI is Reducing Financial Fraud

How Generative AI is Reducing Financial Fraud

Comments
2 min read
Boring Cybersecurity Theory: Main disciplines (Time to select your own way)

Boring Cybersecurity Theory: Main disciplines (Time to select your own way)

1
Comments
8 min read
Building a Layered Security System to Prevent Cyber Attacks in Corporate Environments

Building a Layered Security System to Prevent Cyber Attacks in Corporate Environments

6
Comments
3 min read
Remote Code Execution (RCE) Vulnerabilities: Detection and Prevention

Remote Code Execution (RCE) Vulnerabilities: Detection and Prevention

1
Comments
2 min read
Buffer Overflow Exploitation: Memory Corruption Attack Analysis

Buffer Overflow Exploitation: Memory Corruption Attack Analysis

1
Comments
2 min read
Cross-Site Scripting (XSS) Attack Vectors and Defense Mechanisms

Cross-Site Scripting (XSS) Attack Vectors and Defense Mechanisms

1
Comments
1 min read
Critical SQL Injection Vulnerability Analysis and Prevention

Critical SQL Injection Vulnerability Analysis and Prevention

1
Comments
1 min read
Advanced Persistent Threats (APT): Threat Hunting Methodologies

Advanced Persistent Threats (APT): Threat Hunting Methodologies

1
Comments
2 min read
Zero-Day Exploits: Vulnerability Research and Defense Strategies

Zero-Day Exploits: Vulnerability Research and Defense Strategies

1
Comments
2 min read
Critical SQL Injection in Kingsoft Endpoint Security V9 — Patch Now

Critical SQL Injection in Kingsoft Endpoint Security V9 — Patch Now

6
Comments
2 min read
Debian 13 Trixie Released What You Need to Know

Debian 13 Trixie Released What You Need to Know

1
Comments
1 min read
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

1
Comments
6 min read
Remote Code Execution Flaw Found in Yonyou U8 Cloud (All Versions Affected)

Remote Code Execution Flaw Found in Yonyou U8 Cloud (All Versions Affected)

6
Comments
2 min read
From Zero-Trust to Quantum-Safe: The Next Big Shifts in Cybersecurity

From Zero-Trust to Quantum-Safe: The Next Big Shifts in Cybersecurity

1
Comments
2 min read
HTB - Support - Windows (Easy)

HTB - Support - Windows (Easy)

1
Comments
1 min read
𝗦𝘁𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝗮𝘁𝘁𝗮𝗰𝗸𝘀 𝗙𝗮𝘀𝘁

𝗦𝘁𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝗮𝘁𝘁𝗮𝗰𝗸𝘀 𝗙𝗮𝘀𝘁

1
Comments
1 min read
Boring Cybersecurity Theory: Ethics (Make Your Choice)

Boring Cybersecurity Theory: Ethics (Make Your Choice)

1
Comments
5 min read
North Korea Hits Diplomats with GitHub-Based Attacks

North Korea Hits Diplomats with GitHub-Based Attacks

1
Comments
1 min read
PeaZip 10.6 Enhances Archive Handling and Speed

PeaZip 10.6 Enhances Archive Handling and Speed

1
Comments
1 min read
AI Scams in 2025: 7 Real Examples and How to Avoid Them

AI Scams in 2025: 7 Real Examples and How to Avoid Them

Comments
3 min read
Don’t Panic Yet: Breaking Down the Latest Apache Solr RCE Vulnerability

Don’t Panic Yet: Breaking Down the Latest Apache Solr RCE Vulnerability

6
Comments
3 min read
SafeLine WAF Logging & Monitoring: What Every Homelab Needs

SafeLine WAF Logging & Monitoring: What Every Homelab Needs

6
Comments 1
2 min read
loading...