DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
3-Minute Setup: The Open Source WAF That’s Taking Over GitHub

3-Minute Setup: The Open Source WAF That’s Taking Over GitHub

10
Comments 1
3 min read
SafeLine WAF vs Cloudflare & ModSecurity: Real Benchmark, Real Numbers

SafeLine WAF vs Cloudflare & ModSecurity: Real Benchmark, Real Numbers

6
Comments
3 min read
Enterprise Software Development: Shaping the Future of Technology

Enterprise Software Development: Shaping the Future of Technology

Comments
3 min read
TryHackMe: HTTP in Detail

TryHackMe: HTTP in Detail

Comments
2 min read
Behind the Code: A Simple Look at the Software Supply Chain

Behind the Code: A Simple Look at the Software Supply Chain

Comments
2 min read
What is Web Browser Forensics?

What is Web Browser Forensics?

1
Comments
4 min read
🧨 I've built products that detect fraud better than many banks. And I'm a startup.

🧨 I've built products that detect fraud better than many banks. And I'm a startup.

1
Comments
1 min read
Zero Trust Networks: Why VPNs Are Becoming Obsolete

Zero Trust Networks: Why VPNs Are Becoming Obsolete

Comments
3 min read
CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability

CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability

Comments
1 min read
CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

Comments
1 min read
CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability

CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability

Comments
1 min read
Integrating LDAP into a scalable, secure IAM architecture with Keycloak

Integrating LDAP into a scalable, secure IAM architecture with Keycloak

Comments
5 min read
Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Comments
2 min read
The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

Comments 1
4 min read
New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild

New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild

5
Comments
3 min read
The New Battleground of Global Politics

The New Battleground of Global Politics

Comments
6 min read
Downloaded a Fake App? Your Data’s Already Gone!

Downloaded a Fake App? Your Data’s Already Gone!

Comments
3 min read
Cookies Aren’t Just Snacks!

Cookies Aren’t Just Snacks!

Comments
3 min read
AI as Exploit: The Weaponization of Perception and Authority

AI as Exploit: The Weaponization of Perception and Authority

Comments
39 min read
No #Linux OS 🐧

No #Linux OS 🐧

Comments
1 min read
Kali Linux Users Account Management.

Kali Linux Users Account Management.

1
Comments
19 min read
How to Customize the SafeLine Auth Challenge Page

How to Customize the SafeLine Auth Challenge Page

6
Comments
2 min read
🔍 Mastering Blind SQL Injection with Out-of-Band (OAST) Techniques

🔍 Mastering Blind SQL Injection with Out-of-Band (OAST) Techniques

Comments
1 min read
The Future of Defense: AI and Machine Learning in Zero Trust Architecture

The Future of Defense: AI and Machine Learning in Zero Trust Architecture

Comments 1
7 min read
The Imperative of AI API Security: Protecting Your Intelligent Systems

The Imperative of AI API Security: Protecting Your Intelligent Systems

Comments
6 min read
loading...