DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2025-42999: SAP NetWeaver Deserialization Vulnerability

CVE-2025-42999: SAP NetWeaver Deserialization Vulnerability

1
Comments
1 min read
Boring Cybersecurity Theory: Playbook and Zero-day attack

Boring Cybersecurity Theory: Playbook and Zero-day attack

1
Comments
11 min read
How Termux Helps You Learn Linux and Cybersecurity

How Termux Helps You Learn Linux and Cybersecurity

1
Comments
4 min read
SafeLine WAF — The Self-Hosted Firewall Every Homelab Needs

SafeLine WAF — The Self-Hosted Firewall Every Homelab Needs

7
Comments
2 min read
Building a Cryptographically Secure Password Generator in C# .NET

Building a Cryptographically Secure Password Generator in C# .NET

Comments
6 min read
Smartbi RCE Vulnerability — Patch Now Before Attackers Do

Smartbi RCE Vulnerability — Patch Now Before Attackers Do

7
Comments
2 min read
How to Build a Resilient Cybersecurity Framework for Critical Infrastructure

How to Build a Resilient Cybersecurity Framework for Critical Infrastructure

1
Comments
3 min read
The Role of Red Teaming in Cyber Resilience Planning

The Role of Red Teaming in Cyber Resilience Planning

1
Comments
3 min read
Toptal GitHub Hacked: 10 Malicious npm Packages Hit 5,000 Downloads

Toptal GitHub Hacked: 10 Malicious npm Packages Hit 5,000 Downloads

1
Comments
1 min read
Cybersecurity Tutorial: Your Complete Step-by-Step Guide

Cybersecurity Tutorial: Your Complete Step-by-Step Guide

1
Comments 1
6 min read
Boring Cybersecurity Theory: Frameworks (NIST)

Boring Cybersecurity Theory: Frameworks (NIST)

1
Comments
3 min read
Symmetric vs Asymmetric Encryption — Lessons from the Field

Symmetric vs Asymmetric Encryption — Lessons from the Field

1
Comments
2 min read
My Firebase Webapp almost got pwned by a bot. Then another bot saved it.

My Firebase Webapp almost got pwned by a bot. Then another bot saved it.

Comments
1 min read
SafeLine WAF: Custom Rules, Attack Prevention, and Dashboard Insights

SafeLine WAF: Custom Rules, Attack Prevention, and Dashboard Insights

6
Comments
2 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
CVE-2023-50164: New Struts2 Upload Vulnerability Explained

CVE-2023-50164: New Struts2 Upload Vulnerability Explained

6
Comments
3 min read
SafeLine vs. BunkerWeb: Which Open Source WAF Is Right for You?

SafeLine vs. BunkerWeb: Which Open Source WAF Is Right for You?

6
Comments
3 min read
Nmap Lab Series: Build Metasploit Scanners, Gather Info, & Exploit Vulnerabilities

Nmap Lab Series: Build Metasploit Scanners, Gather Info, & Exploit Vulnerabilities

Comments
2 min read
How to Get Real IPs Through FRP with SafeLine WAF

How to Get Real IPs Through FRP with SafeLine WAF

5
Comments
4 min read
Outil de Cybersécurité du Jour - Aug 17, 2025

Outil de Cybersécurité du Jour - Aug 17, 2025

1
Comments
3 min read
Graph to store your security data?

Graph to store your security data?

2
Comments
1 min read
Phishing campaign for tricking Booking.com's users and sharing malware.

Phishing campaign for tricking Booking.com's users and sharing malware.

Comments
2 min read
Day 00: Starting a Cybersecurity Phishing Game

Day 00: Starting a Cybersecurity Phishing Game

Comments
2 min read
Evil-GPT V2 Room | TryHackMe

Evil-GPT V2 Room | TryHackMe

Comments
3 min read
Airodump-ng for Beginners: Scanning and Monitoring Wi-Fi Networks

Airodump-ng for Beginners: Scanning and Monitoring Wi-Fi Networks

5
Comments
4 min read
loading...