DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Advanced Persistent Threats (APT): Threat Hunting Methodologies

Advanced Persistent Threats (APT): Threat Hunting Methodologies

1
Comments
2 min read
Buffer Overflow Exploitation: Memory Corruption Attack Analysis

Buffer Overflow Exploitation: Memory Corruption Attack Analysis

1
Comments
2 min read
Cross-Site Scripting (XSS) Attack Vectors and Defense Mechanisms

Cross-Site Scripting (XSS) Attack Vectors and Defense Mechanisms

1
Comments
1 min read
Zero-Day Exploits: Vulnerability Research and Defense Strategies

Zero-Day Exploits: Vulnerability Research and Defense Strategies

1
Comments
2 min read
Remote Code Execution (RCE) Vulnerabilities: Detection and Prevention

Remote Code Execution (RCE) Vulnerabilities: Detection and Prevention

1
Comments
2 min read
Critical SQL Injection Vulnerability Analysis and Prevention

Critical SQL Injection Vulnerability Analysis and Prevention

1
Comments
1 min read
Critical SQL Injection in Kingsoft Endpoint Security V9 — Patch Now

Critical SQL Injection in Kingsoft Endpoint Security V9 — Patch Now

6
Comments
2 min read
Debian 13 Trixie Released What You Need to Know

Debian 13 Trixie Released What You Need to Know

1
Comments
1 min read
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

1
Comments
6 min read
Remote Code Execution Flaw Found in Yonyou U8 Cloud (All Versions Affected)

Remote Code Execution Flaw Found in Yonyou U8 Cloud (All Versions Affected)

6
Comments
2 min read
From Zero-Trust to Quantum-Safe: The Next Big Shifts in Cybersecurity

From Zero-Trust to Quantum-Safe: The Next Big Shifts in Cybersecurity

1
Comments
2 min read
𝗦𝘁𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝗮𝘁𝘁𝗮𝗰𝗸𝘀 𝗙𝗮𝘀𝘁

𝗦𝘁𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝗮𝘁𝘁𝗮𝗰𝗸𝘀 𝗙𝗮𝘀𝘁

1
Comments
1 min read
Boring Cybersecurity Theory: Ethics (Make Your Choice)

Boring Cybersecurity Theory: Ethics (Make Your Choice)

1
Comments
5 min read
North Korea Hits Diplomats with GitHub-Based Attacks

North Korea Hits Diplomats with GitHub-Based Attacks

1
Comments
1 min read
PeaZip 10.6 Enhances Archive Handling and Speed

PeaZip 10.6 Enhances Archive Handling and Speed

1
Comments
1 min read
Don’t Panic Yet: Breaking Down the Latest Apache Solr RCE Vulnerability

Don’t Panic Yet: Breaking Down the Latest Apache Solr RCE Vulnerability

6
Comments
3 min read
SafeLine WAF Logging & Monitoring: What Every Homelab Needs

SafeLine WAF Logging & Monitoring: What Every Homelab Needs

6
Comments 1
2 min read
Why does IoT Pose Challenges for User Data Privacy?

Why does IoT Pose Challenges for User Data Privacy?

1
Comments
1 min read
Beginner’s Guide to Wordlists and Crunch for Password Testing

Beginner’s Guide to Wordlists and Crunch for Password Testing

17
Comments
3 min read
Brazil Hit by AI Phishing and Efimer Crypto Trojan

Brazil Hit by AI Phishing and Efimer Crypto Trojan

1
Comments
1 min read
CVE-2023-46604: Apache ActiveMQ Deserialization of Untrusted Data Vulnerability

CVE-2023-46604: Apache ActiveMQ Deserialization of Untrusted Data Vulnerability

1
Comments
1 min read
Preparation of Winux. How to make paid features free.

Preparation of Winux. How to make paid features free.

10
Comments 2
3 min read
CVE-2025-42999: SAP NetWeaver Deserialization Vulnerability

CVE-2025-42999: SAP NetWeaver Deserialization Vulnerability

1
Comments
1 min read
Boring Cybersecurity Theory: Playbook and Zero-day attack

Boring Cybersecurity Theory: Playbook and Zero-day attack

1
Comments
11 min read
How Termux Helps You Learn Linux and Cybersecurity

How Termux Helps You Learn Linux and Cybersecurity

1
Comments
4 min read
loading...