DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Rsync Vulnerabilities Open the Door to Remote Exploits

Rsync Vulnerabilities Open the Door to Remote Exploits

5
Comments
2 min read
CVE-2025-49704: Microsoft SharePoint Code Injection Vulnerability

CVE-2025-49704: Microsoft SharePoint Code Injection Vulnerability

1
Comments
2 min read
CVE-2025-2776: SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability

CVE-2025-2776: SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability

1
Comments
1 min read
CVE-2025-54309: CrushFTP Unprotected Alternate Channel Vulnerability

CVE-2025-54309: CrushFTP Unprotected Alternate Channel Vulnerability

1
Comments
1 min read
CVE-2025-2775: SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability

CVE-2025-2775: SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability

1
Comments
1 min read
Exploring Cybersecurity Roles: A Walkthrough of TryHackMe's "Careers in Cyber" Room

Exploring Cybersecurity Roles: A Walkthrough of TryHackMe's "Careers in Cyber" Room

Comments
3 min read
Solving TryHackMe's "Lo-Fi" Room - A Complete Walkthrough

Solving TryHackMe's "Lo-Fi" Room - A Complete Walkthrough

Comments
2 min read
Logbit: A Free AI-Powered Tool for Windows & Active Directory Log Analysis

Logbit: A Free AI-Powered Tool for Windows & Active Directory Log Analysis

1
Comments
1 min read
Essential Cybersecurity Tools Every Business Should Use

Essential Cybersecurity Tools Every Business Should Use

Comments
3 min read
CSP Bypass in Symfony: Examples & Fixes

CSP Bypass in Symfony: Examples & Fixes

5
Comments
3 min read
The Attacking Phase: Where Hackers Thrive and Defenders Sleep

The Attacking Phase: Where Hackers Thrive and Defenders Sleep

2
Comments
2 min read
CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

1
Comments
1 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
OpenSSH RCE Vulnerability (CVE-2024-6387): What You Need to Know

OpenSSH RCE Vulnerability (CVE-2024-6387): What You Need to Know

5
Comments
2 min read
I Completed Cisco’s Networking Basics Course! Here’s Why It Matters

I Completed Cisco’s Networking Basics Course! Here’s Why It Matters

1
Comments
1 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Six Hat Analysis for Personal Data Security

Six Hat Analysis for Personal Data Security

1
Comments
4 min read
CVE-2025-53770: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability

CVE-2025-53770: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability

1
Comments
2 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
Claude, OpenAI, Google API Keys... All Public. This Is What I Found After Scanning GitHub at Scale

Claude, OpenAI, Google API Keys... All Public. This Is What I Found After Scanning GitHub at Scale

1
Comments 1
2 min read
Apache Tomcat RCE on Windows (CVE-2024-50379): Patch Now or Risk Remote Attacks

Apache Tomcat RCE on Windows (CVE-2024-50379): Patch Now or Risk Remote Attacks

6
Comments
3 min read
Who benefits from attack surface & risk management?

Who benefits from attack surface & risk management?

1
Comments
1 min read
Critical NVIDIA Flaw Exposes AI Cloud Services

Critical NVIDIA Flaw Exposes AI Cloud Services

1
Comments
1 min read
How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

10
Comments 2
6 min read
PCI DSS Compliance for SSDs: SSL/TLS Requirements & Best Practices

PCI DSS Compliance for SSDs: SSL/TLS Requirements & Best Practices

1
Comments
4 min read
loading...