DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
50+ Common Web Application Vulnerabilities Explained

50+ Common Web Application Vulnerabilities Explained

9
Comments 1
17 min read
Blue Team vs Red Team vs Purple Team

Blue Team vs Red Team vs Purple Team

Comments
2 min read
Outil de Cybersécurité du Jour - Dec 8, 2025

Outil de Cybersécurité du Jour - Dec 8, 2025

Comments
3 min read
Outil de Cybersécurité du Jour - Dec 7, 2025

Outil de Cybersécurité du Jour - Dec 7, 2025

Comments
3 min read
KRACK Attack - When WPA2 Was Not as Safe as We Thought

KRACK Attack - When WPA2 Was Not as Safe as We Thought

Comments
1 min read
A Breakdown of Darkweb Exit Scams & Their Warning Signs

A Breakdown of Darkweb Exit Scams & Their Warning Signs

Comments
1 min read
The Projector Botnet: How a Simple Home Device Was Exploited for Ads, Data, and Bandwidth

The Projector Botnet: How a Simple Home Device Was Exploited for Ads, Data, and Bandwidth

Comments
4 min read
When Malware Starts Prompt-Engineering Itself

When Malware Starts Prompt-Engineering Itself

Comments
6 min read
Da VPN tradicional ao Zero Trust com Cloudflare Tunnel: um guia prático

Da VPN tradicional ao Zero Trust com Cloudflare Tunnel: um guia prático

Comments
8 min read
Outil de Cybersécurité du Jour - Dec 6, 2025

Outil de Cybersécurité du Jour - Dec 6, 2025

Comments
3 min read
Computer Systems Security An Introduction (Part 1)

Computer Systems Security An Introduction (Part 1)

Comments 1
2 min read
Building SlimShield: A Production-Ready Docker Security Platform with 18 Advanced Features 🚀

Building SlimShield: A Production-Ready Docker Security Platform with 18 Advanced Features 🚀

Comments
3 min read
DARPA's Secret Project: Is the Military Building Artificial

DARPA's Secret Project: Is the Military Building Artificial

Comments
4 min read
Verified Targeted Scraping Attacks and the “Shadow Wizard Money Gang” – In-Depth Analysis

Verified Targeted Scraping Attacks and the “Shadow Wizard Money Gang” – In-Depth Analysis

Comments
12 min read
🛡️ Ethical Hacking Lab Walkthrough: Website Cloning & SMB Enumeration (Beginner-Friendly)

🛡️ Ethical Hacking Lab Walkthrough: Website Cloning & SMB Enumeration (Beginner-Friendly)

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.