DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI Can "Guess" Base64 Encoding - And That Changes Everything

AI Can "Guess" Base64 Encoding - And That Changes Everything

19
Comments 31
3 min read
Tech Debt Is Real: The Internet Runs on 30-Year-Old Code

Tech Debt Is Real: The Internet Runs on 30-Year-Old Code

Comments 1
4 min read
A Complete Overview of Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)

A Complete Overview of Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)

1
Comments 2
11 min read
🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL

🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL

Comments
3 min read
Recovering a Flag from an RDP Cache

Recovering a Flag from an RDP Cache

1
Comments
3 min read
ModSecurity vs SafeLine: Why Not Use Both? (Part 1)

ModSecurity vs SafeLine: Why Not Use Both? (Part 1)

6
Comments
5 min read
Top-tier hacker groups don’t steal — they earn from the CFO

Top-tier hacker groups don’t steal — they earn from the CFO

1
Comments
5 min read
Resillion — when those who preach cybersecurity forget to practice it

Resillion — when those who preach cybersecurity forget to practice it

1
Comments
5 min read
Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)

Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)

2
Comments
3 min read
SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?

SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?

1
Comments
3 min read
Interview With Author Ahmed Awad ( NullC0d3 )

Interview With Author Ahmed Awad ( NullC0d3 )

1
Comments
3 min read
Think Like a Threat: How SOC Teams Can Stop Attacks Before the First Alert

Think Like a Threat: How SOC Teams Can Stop Attacks Before the First Alert

Comments 2
2 min read
🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

1
Comments
1 min read
How I Hack a Hacker

How I Hack a Hacker

13
Comments
4 min read
🔐 AppArmor and ROS2 – The Article I Tried Not to Write

🔐 AppArmor and ROS2 – The Article I Tried Not to Write

Comments
4 min read
CVE-2024-49113: Windows LDAP Flaw Lets Hackers Crash Domain Controllers

CVE-2024-49113: Windows LDAP Flaw Lets Hackers Crash Domain Controllers

5
Comments
3 min read
The Real Breach Happens After the Login: How Privilege Escalation Fuels Cyber Attacks

The Real Breach Happens After the Login: How Privilege Escalation Fuels Cyber Attacks

Comments
1 min read
What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know

What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know

1
Comments 1
4 min read
Mastering REST API Authentication: A Developer's Security Handbook

Mastering REST API Authentication: A Developer's Security Handbook

Comments
4 min read
Cipher's Log: Introduction

Cipher's Log: Introduction

Comments
2 min read
CVE-2016-10033: PHPMailer Command Injection Vulnerability

CVE-2016-10033: PHPMailer Command Injection Vulnerability

1
Comments
1 min read
CVE-2019-5418: Rails Ruby on Rails Path Traversal Vulnerability

CVE-2019-5418: Rails Ruby on Rails Path Traversal Vulnerability

1
Comments
1 min read
The 4 Problems Every AI Agent Developer Faces (And Our Live Solution)

The 4 Problems Every AI Agent Developer Faces (And Our Live Solution)

1
Comments
6 min read
Sending Email Notifications on SSH Login Events

Sending Email Notifications on SSH Login Events

Comments
2 min read
Implementing Multi-Factor Authentication in Azure

Implementing Multi-Factor Authentication in Azure

1
Comments
5 min read
loading...