DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building Bulletproof On-Demand Apps in 2025: Cybersecurity Best Practices for Developers

Building Bulletproof On-Demand Apps in 2025: Cybersecurity Best Practices for Developers

1
Comments
7 min read
Breaking Into the Machine: A Deep Dive Into Automotive Penetration Testing Techniques

Breaking Into the Machine: A Deep Dive Into Automotive Penetration Testing Techniques

1
Comments
3 min read
Meet the Open-Source WAF Trusted by Top Engineers to Block Real-World Attacks

Meet the Open-Source WAF Trusted by Top Engineers to Block Real-World Attacks

5
Comments
3 min read
Mastering the Art of Online Investigation: TryHackMe's "Search Skills" Walkthrough

Mastering the Art of Online Investigation: TryHackMe's "Search Skills" Walkthrough

Comments
3 min read
The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

Comments
7 min read
Detecting Business Logic Flaws in Symfony Apps

Detecting Business Logic Flaws in Symfony Apps

4
Comments
4 min read
Cybersecurity Deep Dive: Security Vulnerability

Cybersecurity Deep Dive: Security Vulnerability

1
Comments 2
1 min read
HIPAA Compliance for Developers: Why It Matters and How to Stay Aligned

HIPAA Compliance for Developers: Why It Matters and How to Stay Aligned

Comments
2 min read
ShellGPT in Cybersecurity: Your Terminal’s Silent Sentinel

ShellGPT in Cybersecurity: Your Terminal’s Silent Sentinel

Comments
3 min read
How to Protect Yourself From Malicious Links: A Complete Guide

How to Protect Yourself From Malicious Links: A Complete Guide

2
Comments
3 min read
Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

1
Comments
5 min read
🔐 "My Password Wasn't Enough": Why You Need Multi-Factor Authentication Now More Than Ever

🔐 "My Password Wasn't Enough": Why You Need Multi-Factor Authentication Now More Than Ever

1
Comments
3 min read
CVE-2024-55550: Mitel MiCollab Path Traversal Vulnerability

CVE-2024-55550: Mitel MiCollab Path Traversal Vulnerability

2
Comments
1 min read
CVE-2024-41713: Mitel MiCollab Path Traversal Vulnerability

CVE-2024-41713: Mitel MiCollab Path Traversal Vulnerability

2
Comments
1 min read
Critical Gogs RCE Vulnerability Resurfaces — Patch Now

Critical Gogs RCE Vulnerability Resurfaces — Patch Now

6
Comments
2 min read
Top 15 Must-Have Resources for DBA Security

Top 15 Must-Have Resources for DBA Security

Comments
6 min read
How One Line of Code Almost Cost My Client Their OpenAI Credits

How One Line of Code Almost Cost My Client Their OpenAI Credits

1
Comments
2 min read
Linux commands for Cyber Security Engineers

Linux commands for Cyber Security Engineers

1
Comments 1
1 min read
The Future of IoT Security: AI/ML Anomaly Detection Explained

The Future of IoT Security: AI/ML Anomaly Detection Explained

Comments 1
8 min read
TakeOver Room | TryHackMe

TakeOver Room | TryHackMe

Comments
4 min read
6 Real-World Web Attacks Stopped by SafeLine WAF

6 Real-World Web Attacks Stopped by SafeLine WAF

7
Comments
3 min read
The Art of Cyber Deception: Why Thinking Like a Liar Can Make You a Better Defender

The Art of Cyber Deception: Why Thinking Like a Liar Can Make You a Better Defender

Comments
2 min read
Shell scripting -001

Shell scripting -001

4
Comments
2 min read
Lessons Learned: Getting Started with Blue Teaming via TryHackMe's "Defensive Security Intro"

Lessons Learned: Getting Started with Blue Teaming via TryHackMe's "Defensive Security Intro"

Comments
2 min read
Why I Hardened My Linux Laptop Like a Vault (and How You Can Too)

Why I Hardened My Linux Laptop Like a Vault (and How You Can Too)

1
Comments 1
3 min read
loading...