DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Don't Run That Code! Your Guide to Staying Safe from Job Scams with Virtual Machines

Don't Run That Code! Your Guide to Staying Safe from Job Scams with Virtual Machines

Comments
3 min read
VM Safety Configuration: A Developer's Guide

VM Safety Configuration: A Developer's Guide

Comments
6 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities

The Real Reason Most Pentests Miss Critical Vulnerabilities

1
Comments
3 min read
Rubber Ducky clone with Pro Micro micro controller

Rubber Ducky clone with Pro Micro micro controller

1
Comments
4 min read
🧪 Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security

🧪 Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security

31
Comments 2
4 min read
Authentication & Security: Keeping Bad Guys Out Without Annoying Users

Authentication & Security: Keeping Bad Guys Out Without Annoying Users

2
Comments
8 min read
Subdomain Takeover

Subdomain Takeover

2
Comments
6 min read
The Assessor's Gambit: A Deep Dive into White, Gray, and Black Box Penetration Testing

The Assessor's Gambit: A Deep Dive into White, Gray, and Black Box Penetration Testing

3
Comments
8 min read
Frontend Devs: Weaponize Beauty. Build UIs That Command Respect

Frontend Devs: Weaponize Beauty. Build UIs That Command Respect

10
Comments 1
9 min read
Arquitetura da Proteção de Dados: Encoding, Hashing e Criptografia

Arquitetura da Proteção de Dados: Encoding, Hashing e Criptografia

Comments
6 min read
Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Comments
2 min read
Beyond "The End of Cybersecurity": Refusal as Default Architecture

Beyond "The End of Cybersecurity": Refusal as Default Architecture

2
Comments 3
12 min read
Cybersecurity Weekly #8: Securing Remote Collaboration for Freelancers & Virtual Teams in 2025

Cybersecurity Weekly #8: Securing Remote Collaboration for Freelancers & Virtual Teams in 2025

1
Comments
3 min read
IoT Security in the 5G Era: How Connected Devices Became the New Attack Surface

IoT Security in the 5G Era: How Connected Devices Became the New Attack Surface

6
Comments
7 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.