DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Website Hacking Project: From Exploitation to Mitigation

Website Hacking Project: From Exploitation to Mitigation

1
Comments
2 min read
Cybersecurity Weekly #3: Deepfakes, Phishing 2.0, and the Fight Against Digital Deception

Cybersecurity Weekly #3: Deepfakes, Phishing 2.0, and the Fight Against Digital Deception

Comments
2 min read
Is It Worth Running Your Own Email Server?

Is It Worth Running Your Own Email Server?

Comments
3 min read
🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

2
Comments
4 min read
CVE-2024-24919: Check Point Quantum Security Gateways Information Disclosure Vulnerability

CVE-2024-24919: Check Point Quantum Security Gateways Information Disclosure Vulnerability

1
Comments
2 min read
The Unspoken Rules: Key Insights From My 15-Year Climb from Junior Specialist to Startup Founder

The Unspoken Rules: Key Insights From My 15-Year Climb from Junior Specialist to Startup Founder

1
Comments
46 min read
Supply Chain Attack: It's 2025 & Let's Learn how to avoid it

Supply Chain Attack: It's 2025 & Let's Learn how to avoid it

Comments
3 min read
Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)

Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)

10
Comments
2 min read
How to Build Courtroom-Ready CIPA & GDPR Evidence Reports for Website Tracking Violations (2025 Guide)

How to Build Courtroom-Ready CIPA & GDPR Evidence Reports for Website Tracking Violations (2025 Guide)

Comments
2 min read
Cybersecurity: Simple Habits to Stay Safe Online

Cybersecurity: Simple Habits to Stay Safe Online

Comments
2 min read
Shodan vs ZoomEye Query Syntax Comparison

Shodan vs ZoomEye Query Syntax Comparison

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 19, 2025

Outil de Cybersécurité du Jour - Sep 19, 2025

1
Comments
3 min read
What to Check Before Migrating Your IT Infrastructure

What to Check Before Migrating Your IT Infrastructure

Comments
2 min read
Malware Campaign Leverages SVGs, Email Attachments, and CDNs to Drop XWorm and Remcos via BAT Scripts

Malware Campaign Leverages SVGs, Email Attachments, and CDNs to Drop XWorm and Remcos via BAT Scripts

1
Comments
1 min read
Why Default Passwords Are Still a Massive Problem in 2025

Why Default Passwords Are Still a Massive Problem in 2025

1
Comments
5 min read
What are the risks, benefits, and future trends of AI in cybersecurity?

What are the risks, benefits, and future trends of AI in cybersecurity?

1
Comments
5 min read
ADS — Alternate Data Streams (Beginner friendly PoC)

ADS — Alternate Data Streams (Beginner friendly PoC)

3
Comments 1
4 min read
The Hacker’s Playbook vs. SafeLine WAF: Who Wins?

The Hacker’s Playbook vs. SafeLine WAF: Who Wins?

6
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 18, 2025

Outil de Cybersécurité du Jour - Sep 18, 2025

5
Comments
3 min read
CiberIA Auditor: Technical Simulation of an AI Security Assessment

CiberIA Auditor: Technical Simulation of an AI Security Assessment

Comments
3 min read
Cyberspace Visibility and Privacy: Why Your Router Might Appear in ZoomEye

Cyberspace Visibility and Privacy: Why Your Router Might Appear in ZoomEye

1
Comments
2 min read
ZoomEye vs. Other Search Engines: Why It’s the Top Choice for Security Researchers

ZoomEye vs. Other Search Engines: Why It’s the Top Choice for Security Researchers

Comments
2 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Comments
1 min read
How Much Does One Hour of Server Downtime Cost — and Why Companies Underestimate These Risks

How Much Does One Hour of Server Downtime Cost — and Why Companies Underestimate These Risks

Comments
2 min read
BlueTeamCon 2025: Finding new approaches to security that don’t let perfect stand in the way of better

BlueTeamCon 2025: Finding new approaches to security that don’t let perfect stand in the way of better

Comments
7 min read
loading...