DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Are Your VSCode Extensions Safe? The Risk We Don’t Talk About

Are Your VSCode Extensions Safe? The Risk We Don’t Talk About

35
Comments
2 min read
Vibe-Guard is Now a VS Code Extension! And It Just Found 8,000+ Security Issues in a Major Enterprise Project

Vibe-Guard is Now a VS Code Extension! And It Just Found 8,000+ Security Issues in a Major Enterprise Project

1
Comments
4 min read
Discover The Network Packet Threat Analyzer API

Discover The Network Packet Threat Analyzer API

Comments
2 min read
Discover The Malware & Phishing URL Scanner API

Discover The Malware & Phishing URL Scanner API

Comments
2 min read
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

Comments
8 min read
Erlang OTP SSH Exploits Target OT Firewalls

Erlang OTP SSH Exploits Target OT Firewalls

1
Comments
1 min read
Tantangan CTF: File yang Dihapus (Root-Me Forensik)

Tantangan CTF: File yang Dihapus (Root-Me Forensik)

Comments
3 min read
How Haowang Used Telegram to Run a $27B Scam Empire for 5 Years

How Haowang Used Telegram to Run a $27B Scam Empire for 5 Years

6
Comments 8
6 min read
# Vector Digitizing vs. Raster Graphics: Why Quality Matters in Embroidery

# Vector Digitizing vs. Raster Graphics: Why Quality Matters in Embroidery

Comments
3 min read
Common Attacks | TryHackMe Write-Up

Common Attacks | TryHackMe Write-Up

Comments
6 min read
Critical RCE Vulnerability Found in IP-guard WebServer — Patch Now!

Critical RCE Vulnerability Found in IP-guard WebServer — Patch Now!

6
Comments
2 min read
#DAY 7: From Data to Detection

#DAY 7: From Data to Detection

1
Comments
5 min read
An Encryption Algorithm

An Encryption Algorithm

Comments
2 min read
Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move

Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move

Comments
9 min read
Why Developers Are Turning to SafeLine as Their Go-To WAF

Why Developers Are Turning to SafeLine as Their Go-To WAF

7
Comments
3 min read
Hands-on OverTheWire Bandit - Day 1 Progress

Hands-on OverTheWire Bandit - Day 1 Progress

1
Comments
1 min read
Did you know your database schema might be leaking through error messages and stack traces?

Did you know your database schema might be leaking through error messages and stack traces?

Comments
1 min read
CSPM, CIEM, CNAPP: What These Cloud Security Tools Really Do and Why They Matter for You

CSPM, CIEM, CNAPP: What These Cloud Security Tools Really Do and Why They Matter for You

Comments
4 min read
""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

24
Comments 4
22 min read
#DAY 6: Closing the On-Prem Loop

#DAY 6: Closing the On-Prem Loop

1
Comments
3 min read
How to Set Up SafeLine WAF on a Standalone Server for Maximum Security

How to Set Up SafeLine WAF on a Standalone Server for Maximum Security

11
Comments
2 min read
Outil de Cybersécurité du Jour - Aug 12, 2025

Outil de Cybersécurité du Jour - Aug 12, 2025

Comments
3 min read
Outil de Cybersécurité du Jour - Aug 13, 2025

Outil de Cybersécurité du Jour - Aug 13, 2025

Comments
3 min read
If You Have a Single Mum - Read This

If You Have a Single Mum - Read This

5
Comments 8
10 min read
Inside the Hacker’s Playbook (Part 2): The Advanced Stuff Nobody Talks About

Inside the Hacker’s Playbook (Part 2): The Advanced Stuff Nobody Talks About

Comments
2 min read
loading...