DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Containerization: The Future of Secure and Seamless Application Deployment using KASM Workspace

Containerization: The Future of Secure and Seamless Application Deployment using KASM Workspace

Comments
4 min read
Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Comments
4 min read
Building Centurion, a Windows cybersecurity tool to fight phishing, malware & C2 traffic

Building Centurion, a Windows cybersecurity tool to fight phishing, malware & C2 traffic

1
Comments
2 min read
Why Caddy Is My Favorite Reverse Proxy in 2025

Why Caddy Is My Favorite Reverse Proxy in 2025

Comments
3 min read
Why Bsky.app is Rising While X.com is Declining (and How to Automate Bsky Posts with Python)

Why Bsky.app is Rising While X.com is Declining (and How to Automate Bsky Posts with Python)

Comments
5 min read
How I Built a Web Vulnerabilty Scanner - OpenEye

How I Built a Web Vulnerabilty Scanner - OpenEye

6
Comments
7 min read
VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

7
Comments 1
11 min read
decoy-hunter — Contrarrestando la Decepción "All Ports Are Open"

decoy-hunter — Contrarrestando la Decepción "All Ports Are Open"

2
Comments
5 min read
Module 2 — Derived Identities and Secure Export Author: Antonio José Socorro Marín Fecha: 28 de septiembre de 2025

Module 2 — Derived Identities and Secure Export Author: Antonio José Socorro Marín Fecha: 28 de septiembre de 2025

1
Comments
11 min read
Module 2 — Derived Identities and Secure Export

Module 2 — Derived Identities and Secure Export

1
Comments
4 min read
What is DNS and how does it work

What is DNS and how does it work

Comments
3 min read
decoy-hunter — Countering the "All Ports Are Open" Deception Author: Antonio José Socorro Marín Date: September 28, 2025

decoy-hunter — Countering the "All Ports Are Open" Deception Author: Antonio José Socorro Marín Date: September 28, 2025

1
Comments
5 min read
The Unspoken Conversation: When Your Code Attracts the Wrong Kind of Attention

The Unspoken Conversation: When Your Code Attracts the Wrong Kind of Attention

6
Comments
3 min read
Top 10 Cybersecurity Projects You Can’t Miss in 2026

Top 10 Cybersecurity Projects You Can’t Miss in 2026

6
Comments
4 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Comments
6 min read
🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

6
Comments 3
6 min read
How Teaching Cybersecurity Changed the Way I See Hackers

How Teaching Cybersecurity Changed the Way I See Hackers

Comments
2 min read
Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

1
Comments
3 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
How to future-proof your web app's password authentication

How to future-proof your web app's password authentication

1
Comments
5 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

Comments
3 min read
The Cyber Warrior Handbook — A Practical, FREE Entry-Level Offensive Security Training Online

The Cyber Warrior Handbook — A Practical, FREE Entry-Level Offensive Security Training Online

Comments
2 min read
Hybrid Infrastructure: Why Businesses Combine Cloud and Physical Servers

Hybrid Infrastructure: Why Businesses Combine Cloud and Physical Servers

Comments
2 min read
loading...