DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI-Powered Cybersecurity Systems: Attack Prediction Models

AI-Powered Cybersecurity Systems: Attack Prediction Models

5
Comments 1
6 min read
The basics commands of Linux

The basics commands of Linux

Comments
1 min read
API Vulnerabilities in Symfony: Real-World Examples

API Vulnerabilities in Symfony: Real-World Examples

2
Comments
3 min read
CVE-2024-43451: Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability

CVE-2024-43451: Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability

Comments
2 min read
🛑 Still in the disk group? You’re one command from root.

🛑 Still in the disk group? You’re one command from root.

Comments
1 min read
Supply Chain Attacks: The Silent Killer with THM Nagpur

Supply Chain Attacks: The Silent Killer with THM Nagpur

5
Comments
4 min read
I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

3
Comments
1 min read
Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

2
Comments
3 min read
Generative AI: The Double-Edged Sword in Cloud-Native Security

Generative AI: The Double-Edged Sword in Cloud-Native Security

1
Comments
9 min read
Where it all started.

Where it all started.

1
Comments
4 min read
Start Your Cybersecurity Path: Hands-On Linux Essentials Labs

Start Your Cybersecurity Path: Hands-On Linux Essentials Labs

Comments
2 min read
Trying Out PowerShell for Process Logging — Finally Something That Feels Like Real Scripting 😅

Trying Out PowerShell for Process Logging — Finally Something That Feels Like Real Scripting 😅

Comments 1
2 min read
My first portfolio in Figma

My first portfolio in Figma

1
Comments 2
3 min read
Insecure Deserialization in Symfony: How to Prevent It

Insecure Deserialization in Symfony: How to Prevent It

3
Comments
3 min read
My Journey with the Zen of Python: Learning to Code, Learning to Grow

My Journey with the Zen of Python: Learning to Code, Learning to Grow

1
Comments 1
3 min read
SSO Security Exposed: Real-World Attack Scenarios in 2025

SSO Security Exposed: Real-World Attack Scenarios in 2025

2
Comments
3 min read
CVE-2017-0144: Microsoft SMBv1 Remote Code Execution Vulnerability

CVE-2017-0144: Microsoft SMBv1 Remote Code Execution Vulnerability

1
Comments 3
1 min read
AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

1
Comments
2 min read
Hacker Using Metasploit and Nmap for Offensive Security in 2025

Hacker Using Metasploit and Nmap for Offensive Security in 2025

7
Comments
1 min read
CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability

CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability

Comments
2 min read
Cybersecurity Certification: Your Gateway to a Secure and Rewarding Career

Cybersecurity Certification: Your Gateway to a Secure and Rewarding Career

1
Comments
2 min read
Cracking the code: How Copilot supercharged my last CTF and where it fell short

Cracking the code: How Copilot supercharged my last CTF and where it fell short

Comments 1
9 min read
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets

The Essential Guide to Web Security Scanning: Protecting Your Digital Assets

Comments
2 min read
Can You Get Hacked by Watching a Video?

Can You Get Hacked by Watching a Video?

Comments
3 min read
You Gave Them Everything Just to Scroll for Free

You Gave Them Everything Just to Scroll for Free

Comments
4 min read
loading...