DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Getting Started with Network Probing using Bettercap

Getting Started with Network Probing using Bettercap

10
Comments
3 min read
SOC (Security Operations Center) Fundamentals: A Beginner’s Guide

SOC (Security Operations Center) Fundamentals: A Beginner’s Guide

1
Comments
8 min read
A Beginner’s Guide to Channels in WiFi Scanning

A Beginner’s Guide to Channels in WiFi Scanning

12
Comments
3 min read
Seamlessly Redirect HTTP to HTTPS with SafeLine WAF

Seamlessly Redirect HTTP to HTTPS with SafeLine WAF

6
Comments
2 min read
🛡️ UHT-Framework: A Modern Hacking Toolkit for Ethical Hackers & Pentesters

🛡️ UHT-Framework: A Modern Hacking Toolkit for Ethical Hackers & Pentesters

1
Comments
2 min read
CVE-2025-24054: Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability

CVE-2025-24054: Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability

1
Comments
1 min read
Preventing SQL Injection: Essential Defense Tactics for Web Developers

Preventing SQL Injection: Essential Defense Tactics for Web Developers

1
Comments
2 min read
ARP Spoofing Explained Like You Are New to Networking

ARP Spoofing Explained Like You Are New to Networking

10
Comments
3 min read
CVE-2007-0671: Microsoft Office Excel Remote Code Execution Vulnerability

CVE-2007-0671: Microsoft Office Excel Remote Code Execution Vulnerability

1
Comments
1 min read
CVE-2025-8088: RARLAB WinRAR Path Traversal Vulnerability

CVE-2025-8088: RARLAB WinRAR Path Traversal Vulnerability

1
Comments
1 min read
AI Workload Security in 2025: The Battle to Safeguard ML Pipelines

AI Workload Security in 2025: The Battle to Safeguard ML Pipelines

2
Comments
3 min read
The intel Management Engine:~The Ghost in your machine

The intel Management Engine:~The Ghost in your machine

2
Comments
3 min read
Top 5 Open Source WAFs to Secure Your Web Apps in 2025

Top 5 Open Source WAFs to Secure Your Web Apps in 2025

8
Comments 1
3 min read
Akira Ransomware Hits SonicWall VPNs in Zero-Day Attack

Akira Ransomware Hits SonicWall VPNs in Zero-Day Attack

1
Comments
1 min read
One Bug, Many Faces: Understanding Every Type of Race Condition Vulnerability

One Bug, Many Faces: Understanding Every Type of Race Condition Vulnerability

Comments
13 min read
CVE-2024-9680: Mozilla Firefox Use-After-Free Vulnerability

CVE-2024-9680: Mozilla Firefox Use-After-Free Vulnerability

1
Comments
2 min read
CVE-2024-49039: Microsoft Windows Task Scheduler Privilege Escalation Vulnerability

CVE-2024-49039: Microsoft Windows Task Scheduler Privilege Escalation Vulnerability

1
Comments
2 min read
When AI Fights Back: The Next Decade of Digital Security

When AI Fights Back: The Next Decade of Digital Security

1
Comments 1
3 min read
Meet MIC: The Digital Security Guard in Your Wi-Fi

Meet MIC: The Digital Security Guard in Your Wi-Fi

10
Comments
3 min read
Configuring Hybrid Authentication (Certificates + Users) in AWS Client VPN

Configuring Hybrid Authentication (Certificates + Users) in AWS Client VPN

Comments
5 min read
How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

1
Comments
2 min read
🔎 CloakDetect: Revealing the Hidden Side of the Web

🔎 CloakDetect: Revealing the Hidden Side of the Web

1
Comments
1 min read
ん, and?

ん, and?

4
Comments
4 min read
Man-in-the-Middle (MITM) Attacks: Detection and Prevention Strategies

Man-in-the-Middle (MITM) Attacks: Detection and Prevention Strategies

1
Comments 1
2 min read
How Generative AI is Reducing Financial Fraud

How Generative AI is Reducing Financial Fraud

Comments
2 min read
loading...