DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why does IoT Pose Challenges for User Data Privacy?

Why does IoT Pose Challenges for User Data Privacy?

1
Comments
1 min read
Beginner’s Guide to Wordlists and Crunch for Password Testing

Beginner’s Guide to Wordlists and Crunch for Password Testing

17
Comments
3 min read
Brazil Hit by AI Phishing and Efimer Crypto Trojan

Brazil Hit by AI Phishing and Efimer Crypto Trojan

1
Comments
1 min read
CVE-2023-46604: Apache ActiveMQ Deserialization of Untrusted Data Vulnerability

CVE-2023-46604: Apache ActiveMQ Deserialization of Untrusted Data Vulnerability

1
Comments
1 min read
Preparation of Winux. How to make paid features free.

Preparation of Winux. How to make paid features free.

10
Comments 2
3 min read
CVE-2025-42999: SAP NetWeaver Deserialization Vulnerability

CVE-2025-42999: SAP NetWeaver Deserialization Vulnerability

1
Comments
1 min read
Boring Cybersecurity Theory: Playbook and Zero-day attack

Boring Cybersecurity Theory: Playbook and Zero-day attack

1
Comments
11 min read
How Termux Helps You Learn Linux and Cybersecurity

How Termux Helps You Learn Linux and Cybersecurity

1
Comments
4 min read
Building a Cryptographically Secure Password Generator in C# .NET

Building a Cryptographically Secure Password Generator in C# .NET

Comments
6 min read
Smartbi RCE Vulnerability — Patch Now Before Attackers Do

Smartbi RCE Vulnerability — Patch Now Before Attackers Do

7
Comments
2 min read
How to Build a Resilient Cybersecurity Framework for Critical Infrastructure

How to Build a Resilient Cybersecurity Framework for Critical Infrastructure

1
Comments
3 min read
The Role of Red Teaming in Cyber Resilience Planning

The Role of Red Teaming in Cyber Resilience Planning

1
Comments
3 min read
Toptal GitHub Hacked: 10 Malicious npm Packages Hit 5,000 Downloads

Toptal GitHub Hacked: 10 Malicious npm Packages Hit 5,000 Downloads

1
Comments
1 min read
Cybersecurity Tutorial: Your Complete Step-by-Step Guide

Cybersecurity Tutorial: Your Complete Step-by-Step Guide

Comments 1
6 min read
Boring Cybersecurity Theory: Frameworks (NIST)

Boring Cybersecurity Theory: Frameworks (NIST)

1
Comments
3 min read
Symmetric vs Asymmetric Encryption — Lessons from the Field

Symmetric vs Asymmetric Encryption — Lessons from the Field

1
Comments
2 min read
My Firebase Webapp almost got pwned by a bot. Then another bot saved it.

My Firebase Webapp almost got pwned by a bot. Then another bot saved it.

Comments
1 min read
SafeLine WAF: Custom Rules, Attack Prevention, and Dashboard Insights

SafeLine WAF: Custom Rules, Attack Prevention, and Dashboard Insights

6
Comments
2 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
CVE-2023-50164: New Struts2 Upload Vulnerability Explained

CVE-2023-50164: New Struts2 Upload Vulnerability Explained

6
Comments
3 min read
SafeLine vs. BunkerWeb: Which Open Source WAF Is Right for You?

SafeLine vs. BunkerWeb: Which Open Source WAF Is Right for You?

6
Comments
3 min read
Nmap Lab Series: Build Metasploit Scanners, Gather Info, & Exploit Vulnerabilities

Nmap Lab Series: Build Metasploit Scanners, Gather Info, & Exploit Vulnerabilities

Comments
2 min read
How to Get Real IPs Through FRP with SafeLine WAF

How to Get Real IPs Through FRP with SafeLine WAF

5
Comments
4 min read
Outil de Cybersécurité du Jour - Aug 17, 2025

Outil de Cybersécurité du Jour - Aug 17, 2025

1
Comments
3 min read
Graph to store your security data?

Graph to store your security data?

2
Comments
1 min read
loading...