DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2025-47812: Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability

CVE-2025-47812: Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability

1
Comments
1 min read
🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

12
Comments 3
2 min read
Enhancing Web Security with Content Security Policy (CSP)

Enhancing Web Security with Content Security Policy (CSP)

Comments
2 min read
🕵️‍♂️ I Found a Telegram Bot That Handles Fake Emails Like a Pro (And I Had to Talk About It)

🕵️‍♂️ I Found a Telegram Bot That Handles Fake Emails Like a Pro (And I Had to Talk About It)

Comments
2 min read
Tryhackme - Cyber Kill Chain

Tryhackme - Cyber Kill Chain

2
Comments
5 min read
Fake Job Offers Are Turning GitHub Repos Into a Trap

Fake Job Offers Are Turning GitHub Repos Into a Trap

3
Comments
5 min read
CVE-2018-15133: Laravel Deserialization of Untrusted Data Vulnerability

CVE-2018-15133: Laravel Deserialization of Untrusted Data Vulnerability

Comments 1
1 min read
CVE-2024-36401: OSGeo GeoServer GeoTools Eval Injection Vulnerability

CVE-2024-36401: OSGeo GeoServer GeoTools Eval Injection Vulnerability

Comments
2 min read
Hack Happens. Are You Ready to Respond?

Hack Happens. Are You Ready to Respond?

8
Comments 4
3 min read
Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography

Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography

3
Comments
7 min read
🔐 June: Password Management Month – Strengthen Your Digital Locks

🔐 June: Password Management Month – Strengthen Your Digital Locks

Comments
2 min read
Symfony Command Injection: Risks & Secure Coding

Symfony Command Injection: Risks & Secure Coding

4
Comments
3 min read
Secure Your MQTT Client in C# with Basic Authentication

Secure Your MQTT Client in C# with Basic Authentication

1
Comments
1 min read
Protege tu cliente MQTT en C# con autenticación básica

Protege tu cliente MQTT en C# con autenticación básica

Comments
2 min read
Would you like to be a movie star by contributing to open source?

Would you like to be a movie star by contributing to open source?

1
Comments
2 min read
Deploying SafeLine WAF on Kubernetes: A Beginner-Friendly Guide

Deploying SafeLine WAF on Kubernetes: A Beginner-Friendly Guide

5
Comments
3 min read
The Telegram Username Scam: How People Are Losing Thousands in TON

The Telegram Username Scam: How People Are Losing Thousands in TON

10
Comments 10
7 min read
TryHackMe Pickle Rick Walkthrough | Complete Beginner’s Guide

TryHackMe Pickle Rick Walkthrough | Complete Beginner’s Guide

1
Comments
4 min read
How to become a “HACKER”

How to become a “HACKER”

1
Comments
2 min read
Mastering Input Filtering in PHP: A Guide to `filter_input` Techniques

Mastering Input Filtering in PHP: A Guide to `filter_input` Techniques

1
Comments
2 min read
What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

3
Comments 2
5 min read
Beyond CVE: Building a Complete Vulnerability Intelligence Pipeline

Beyond CVE: Building a Complete Vulnerability Intelligence Pipeline

1
Comments
4 min read
The Lazarus Hackers: Everything You Know Is a Lie

The Lazarus Hackers: Everything You Know Is a Lie

6
Comments
5 min read
Creating a resource group and a storage account on Azure for beginners.

Creating a resource group and a storage account on Azure for beginners.

5
Comments
2 min read
# How to Investigate a Compromised Linux Server

# How to Investigate a Compromised Linux Server

11
Comments
12 min read
loading...