DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Phishing campaign for tricking Booking.com's users and sharing malware.

Phishing campaign for tricking Booking.com's users and sharing malware.

Comments
2 min read
Day 00: Starting a Cybersecurity Phishing Game

Day 00: Starting a Cybersecurity Phishing Game

Comments
2 min read
Evil-GPT V2 Room | TryHackMe

Evil-GPT V2 Room | TryHackMe

Comments
3 min read
Airodump-ng for Beginners: Scanning and Monitoring Wi-Fi Networks

Airodump-ng for Beginners: Scanning and Monitoring Wi-Fi Networks

5
Comments
4 min read
Social engineering (Human Hacking)

Social engineering (Human Hacking)

Comments
2 min read
How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

49
Comments
4 min read
Protect Your Python Secrets Like a Pro with PyShield-Secure

Protect Your Python Secrets Like a Pro with PyShield-Secure

Comments
1 min read
SOCKS Proxy Basics: How They Work and Why Cybersecurity Pros Use Them

SOCKS Proxy Basics: How They Work and Why Cybersecurity Pros Use Them

1
Comments 2
4 min read
Creating a extremely secure hacker-proof system

Creating a extremely secure hacker-proof system

3
Comments
4 min read
Real-World SOCKS Proxy Use Cases for Cybersecurity and Network Administration

Real-World SOCKS Proxy Use Cases for Cybersecurity and Network Administration

1
Comments 2
5 min read
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance

Boring Cybersecurity Theory: Controls, Frameworks, and Compliance

1
Comments
6 min read
Top Tools and Applications That Support SOCKS5 Proxies

Top Tools and Applications That Support SOCKS5 Proxies

2
Comments
5 min read
Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

1
Comments
4 min read
SOCKS4 vs SOCKS5: Key Differences, Security Features, and Comparisons with HTTP & VPN

SOCKS4 vs SOCKS5: Key Differences, Security Features, and Comparisons with HTTP & VPN

1
Comments
7 min read
Lab Setup: Using SOCKS Proxies, ProxyChains, and SSH Dynamic Port Forwarding

Lab Setup: Using SOCKS Proxies, ProxyChains, and SSH Dynamic Port Forwarding

1
Comments
2 min read
QRTrust: Privacy-First QR Scanner with Phishing Detection

QRTrust: Privacy-First QR Scanner with Phishing Detection

Comments
3 min read
Why Generative AI is a Double-Edged Sword for Enterprise Security.

Why Generative AI is a Double-Edged Sword for Enterprise Security.

1
Comments
2 min read
Firewalls 101

Firewalls 101

Comments
12 min read
KDE Gear 25.08 Released with Key Improvements

KDE Gear 25.08 Released with Key Improvements

1
Comments
1 min read
Boring Cybersecurity Theory: Security Domains From CISSP

Boring Cybersecurity Theory: Security Domains From CISSP

1
Comments
5 min read
Making a Browser That Slips Past WiFi Captive Portals — and Why This Loophole Isn’t Worth It

Making a Browser That Slips Past WiFi Captive Portals — and Why This Loophole Isn’t Worth It

4
Comments
5 min read
F5 BIG-IP RCE (CVE-2023-46747): What You Need to Know Right Now

F5 BIG-IP RCE (CVE-2023-46747): What You Need to Know Right Now

6
Comments
3 min read
CVE-2025-8875: N-able N-Central Insecure Deserialization Vulnerability

CVE-2025-8875: N-able N-Central Insecure Deserialization Vulnerability

1
Comments
1 min read
CVE-2025-8876: N-able N-Central Command Injection Vulnerability

CVE-2025-8876: N-able N-Central Command Injection Vulnerability

1
Comments
1 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

2
Comments
13 min read
loading...