DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Think You’re Secure? Penetration Testing Will Tell You the Truth

Think You’re Secure? Penetration Testing Will Tell You the Truth

44
Comments
6 min read
Pen Testing Your Mobile Application (and Its API)

Pen Testing Your Mobile Application (and Its API)

1
Comments
4 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

21
Comments 12
4 min read
The Importance of an AI Strategy

The Importance of an AI Strategy

16
Comments
12 min read
Protecting Against Open Source Malicious Packages: What Does (Not) Work

Protecting Against Open Source Malicious Packages: What Does (Not) Work

2
Comments
14 min read
Hack the box - Dancing (SMB)

Hack the box - Dancing (SMB)

Comments
2 min read
15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

Comments
34 min read
Zero Trust Security: Why It’s No Longer Optional

Zero Trust Security: Why It’s No Longer Optional

Comments
1 min read
AWS IAM Tutorial for Beginners: Easy Steps to Manage Access

AWS IAM Tutorial for Beginners: Easy Steps to Manage Access

2
Comments 2
5 min read
I’m glad to share that I have successfully completed the main technical track of the Cybersecurity Academy scholarship

I’m glad to share that I have successfully completed the main technical track of the Cybersecurity Academy scholarship

1
Comments
1 min read
🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About

🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About

Comments
2 min read
SafeLine vs Reblaze: Smarter WAF for Modern Web Protection?

SafeLine vs Reblaze: Smarter WAF for Modern Web Protection?

10
Comments
2 min read
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution

iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution

6
Comments
2 min read
Understanding Microsoft SharePoint Zero-Day Vulnerabilities — What Developers Should Know

Understanding Microsoft SharePoint Zero-Day Vulnerabilities — What Developers Should Know

Comments
2 min read
UAT-7237 Targets Taiwan Servers with Custom Hacking Tools

UAT-7237 Targets Taiwan Servers with Custom Hacking Tools

1
Comments
1 min read
A Practical Guide to Free Vulnerability Scanners for Developers and Security Teams

A Practical Guide to Free Vulnerability Scanners for Developers and Security Teams

Comments
3 min read
Protect Your Web Application with SafeLine: A Step-by-Step Guide

Protect Your Web Application with SafeLine: A Step-by-Step Guide

6
Comments
2 min read
Safeline + Ingress-nginx: WAF Integration Guide for K8s

Safeline + Ingress-nginx: WAF Integration Guide for K8s

6
Comments
3 min read
Deploy SafeLine WAF with Docker — A Step-by-Step Guide

Deploy SafeLine WAF with Docker — A Step-by-Step Guide

6
Comments
2 min read
How I created a successful recon tool for bug hunters and how you can build one too

How I created a successful recon tool for bug hunters and how you can build one too

Comments
10 min read
Restarting My Journey Into Tech & Cybersecurity

Restarting My Journey Into Tech & Cybersecurity

Comments
1 min read
VirtualBox 7.2 Adds Linux Kernel 6.17 Support

VirtualBox 7.2 Adds Linux Kernel 6.17 Support

1
Comments
1 min read
Citrix NetScaler ADC/Gateway Session Token Leak — Patch Now or Risk a Breach

Citrix NetScaler ADC/Gateway Session Token Leak — Patch Now or Risk a Breach

6
Comments
2 min read
Getting Started with Network Probing using Bettercap

Getting Started with Network Probing using Bettercap

10
Comments
3 min read
SOC (Security Operations Center) Fundamentals: A Beginner’s Guide

SOC (Security Operations Center) Fundamentals: A Beginner’s Guide

1
Comments
8 min read
loading...