DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SOCKS Proxy Basics: How They Work and Why Cybersecurity Pros Use Them

SOCKS Proxy Basics: How They Work and Why Cybersecurity Pros Use Them

2
Comments 2
4 min read
Creating a extremely secure hacker-proof system

Creating a extremely secure hacker-proof system

3
Comments
4 min read
Real-World SOCKS Proxy Use Cases for Cybersecurity and Network Administration

Real-World SOCKS Proxy Use Cases for Cybersecurity and Network Administration

1
Comments 2
5 min read
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance

Boring Cybersecurity Theory: Controls, Frameworks, and Compliance

1
Comments
6 min read
Top Tools and Applications That Support SOCKS5 Proxies

Top Tools and Applications That Support SOCKS5 Proxies

2
Comments
5 min read
SOCKS4 vs SOCKS5: Key Differences, Security Features, and Comparisons with HTTP & VPN

SOCKS4 vs SOCKS5: Key Differences, Security Features, and Comparisons with HTTP & VPN

1
Comments
7 min read
Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

Proxy Chaining Explained: Using ProxyChains for Stealth and Pivoting in Pen-Testing

1
Comments
4 min read
Lab Setup: Using SOCKS Proxies, ProxyChains, and SSH Dynamic Port Forwarding

Lab Setup: Using SOCKS Proxies, ProxyChains, and SSH Dynamic Port Forwarding

1
Comments
2 min read
QRTrust: Privacy-First QR Scanner with Phishing Detection

QRTrust: Privacy-First QR Scanner with Phishing Detection

Comments
3 min read
Why Generative AI is a Double-Edged Sword for Enterprise Security.

Why Generative AI is a Double-Edged Sword for Enterprise Security.

1
Comments
2 min read
Firewalls 101

Firewalls 101

Comments
12 min read
10 Best Free L7 DDoS Protection Tools in 2025

10 Best Free L7 DDoS Protection Tools in 2025

7
Comments 4
2 min read
KDE Gear 25.08 Released with Key Improvements

KDE Gear 25.08 Released with Key Improvements

1
Comments
1 min read
Boring Cybersecurity Theory: Security Domains From CISSP

Boring Cybersecurity Theory: Security Domains From CISSP

1
Comments
5 min read
Making a Browser That Slips Past WiFi Captive Portals — and Why This Loophole Isn’t Worth It

Making a Browser That Slips Past WiFi Captive Portals — and Why This Loophole Isn’t Worth It

4
Comments
5 min read
F5 BIG-IP RCE (CVE-2023-46747): What You Need to Know Right Now

F5 BIG-IP RCE (CVE-2023-46747): What You Need to Know Right Now

6
Comments
3 min read
CVE-2025-8875: N-able N-Central Insecure Deserialization Vulnerability

CVE-2025-8875: N-able N-Central Insecure Deserialization Vulnerability

1
Comments
1 min read
CVE-2025-8876: N-able N-Central Command Injection Vulnerability

CVE-2025-8876: N-able N-Central Command Injection Vulnerability

1
Comments
1 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

2
Comments
13 min read
Boring Cybersecurity Theory: Where it all began

Boring Cybersecurity Theory: Where it all began

1
Comments
5 min read
Boring Cybersecurity Theory: Risk Management

Boring Cybersecurity Theory: Risk Management

1
Comments
8 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)

Boring Cybersecurity Theory: Hats (Understand Attackers)

1
Comments
5 min read
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)

Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)

1
Comments
3 min read
📞 WhatsApp Missed Call Scam — The Call You Should Never Return

📞 WhatsApp Missed Call Scam — The Call You Should Never Return

4
Comments 1
4 min read
🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

1
Comments
3 min read
loading...