DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CEH vs OSCP: Which Cybersecurity Certification is Right for You?

CEH vs OSCP: Which Cybersecurity Certification is Right for You?

2
Comments
3 min read
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

1
Comments
3 min read
📡 Diving into Nmap: Exploring Traffic with Wireshark

📡 Diving into Nmap: Exploring Traffic with Wireshark

1
Comments
1 min read
Linguistic Optimization Procedure for AI Security

Linguistic Optimization Procedure for AI Security

Comments
2 min read
Protect Your Website in 3 Minutes with SafeLine: An Open-Source WAF with 17.3K GitHub Stars

Protect Your Website in 3 Minutes with SafeLine: An Open-Source WAF with 17.3K GitHub Stars

6
Comments
2 min read
ECScape Flaw in Amazon ECS Allows Credential Theft

ECScape Flaw in Amazon ECS Allows Credential Theft

1
Comments
1 min read
SafeLine vs Cloudbric: Smarter WAF Engines, Smarter Protection?

SafeLine vs Cloudbric: Smarter WAF Engines, Smarter Protection?

6
Comments
2 min read
Stop Session Replay Attacks in Symfony Apps

Stop Session Replay Attacks in Symfony Apps

3
Comments
3 min read
Security Briefing: Security Flaw Analysis

Security Briefing: Security Flaw Analysis

2
Comments
3 min read
Threat Advisory: Security Flaw Defense

Threat Advisory: Security Flaw Defense

1
Comments
1 min read
Security Analysis: None

Security Analysis: None

1
Comments
3 min read
Critical Security Flaw: Security Flaw Techniques

Critical Security Flaw: Security Flaw Techniques

1
Comments
1 min read
Threat Intelligence: Security Flaw Exploitation

Threat Intelligence: Security Flaw Exploitation

1
Comments
1 min read
Chromium XXE Flaw Exposes Local Files (CVE-2023-4357)

Chromium XXE Flaw Exposes Local Files (CVE-2023-4357)

7
Comments
3 min read
⚠️ The Hidden Dangers of Using Public Wi-Fi: What You Need to Know

⚠️ The Hidden Dangers of Using Public Wi-Fi: What You Need to Know

Comments
1 min read
🚀 Learn Ethical Hacking — 001

🚀 Learn Ethical Hacking — 001

5
Comments
2 min read
Ever Wondered What Happens When You Click “Send”?

Ever Wondered What Happens When You Click “Send”?

2
Comments
3 min read
Trend Micro Apex One Flaws Actively Exploited

Trend Micro Apex One Flaws Actively Exploited

1
Comments
1 min read
Not All Wi-Fi Is Visible: How Bands Limit What Your Adapter Detects

Not All Wi-Fi Is Visible: How Bands Limit What Your Adapter Detects

5
Comments
3 min read
OWASP Cornucopia Companion Edition

OWASP Cornucopia Companion Edition

3
Comments
2 min read
Built an IP Sweeper in Bash to Check Live Hosts on a /24 Network

Built an IP Sweeper in Bash to Check Live Hosts on a /24 Network

Comments
4 min read
CVE-2022-40139: Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability

CVE-2022-40139: Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability

1
Comments
1 min read
Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

5
Comments
4 min read
Wazuh 4.12 Slack Alert Integration

Wazuh 4.12 Slack Alert Integration

Comments
4 min read
Nacos Admin Interface RCE — SQLi to Full System Compromise

Nacos Admin Interface RCE — SQLi to Full System Compromise

6
Comments
3 min read
loading...