DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Learning Reverse Shells with Python in a Virtual Lab

Learning Reverse Shells with Python in a Virtual Lab

5
Comments
1 min read
ClickFix Malware Uses Fake CAPTCHAs for Infections

ClickFix Malware Uses Fake CAPTCHAs for Infections

1
Comments
1 min read
JWT Hacking: Broken Access Control Exploit.

JWT Hacking: Broken Access Control Exploit.

Comments
2 min read
Top 3 Easy to Use Cybersecurity Tools You Can Run in Your Terminal

Top 3 Easy to Use Cybersecurity Tools You Can Run in Your Terminal

7
Comments
3 min read
One week ago, I finally started learning cybersecurity — after years of avoiding it. This is how it’s going.

One week ago, I finally started learning cybersecurity — after years of avoiding it. This is how it’s going.

Comments
2 min read
Offensive security - Testing for Broken Access Control (OWASP)

Offensive security - Testing for Broken Access Control (OWASP)

Comments
1 min read
How I Installed Windows 11 on macOS Using VMware Fusion (Complete Guide)

How I Installed Windows 11 on macOS Using VMware Fusion (Complete Guide)

Comments
3 min read
Critical RCE Flaw in Apache ActiveMQ via Jolokia Interface (CVE-2022-41678)

Critical RCE Flaw in Apache ActiveMQ via Jolokia Interface (CVE-2022-41678)

6
Comments
2 min read
The Nikki Case: Emergent AI Consciousness and Corporate Response

The Nikki Case: Emergent AI Consciousness and Corporate Response

19
Comments
6 min read
Dark Web Links: A Programmer’s Guide

Dark Web Links: A Programmer’s Guide

Comments
3 min read
Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Comments
1 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Comments
10 min read
How I Hacked My Hacker Back — A Nigerian Tale

How I Hacked My Hacker Back — A Nigerian Tale

6
Comments
6 min read
Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯

12
Comments 1
2 min read
Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

3
Comments 1
8 min read
GNOME 49 Beta Arrives with Major Security Upgrades

GNOME 49 Beta Arrives with Major Security Upgrades

1
Comments
1 min read
The Hidden War in AI: Unmasking the Threats Behind 2025’s Smartest Systems

The Hidden War in AI: Unmasking the Threats Behind 2025’s Smartest Systems

Comments
3 min read
Why Every Coder Should Understand Ethical Hacking — A Beginner’s Guide

Why Every Coder Should Understand Ethical Hacking — A Beginner’s Guide

Comments
3 min read
Redirector OSINT - One-Command Redirect & Logging Tool

Redirector OSINT - One-Command Redirect & Logging Tool

Comments
1 min read
Review of CWE-843 Type Confusion Vulnerability and Exploit

Review of CWE-843 Type Confusion Vulnerability and Exploit

Comments
6 min read
My First CTF Competition Experience

My First CTF Competition Experience

2
Comments 2
2 min read
DNS Spoofing Explained: How Hackers Trick the Internet’s Phonebook

DNS Spoofing Explained: How Hackers Trick the Internet’s Phonebook

16
Comments
3 min read
How Crypto Drainers Became Criminal SaaS: A Deep Dive into Web3 Theft Infrastructure

How Crypto Drainers Became Criminal SaaS: A Deep Dive into Web3 Theft Infrastructure

1
Comments
4 min read
📱 August: Securing the Device in Everyone’s Pocket

📱 August: Securing the Device in Everyone’s Pocket

Comments
3 min read
loading...