DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🚜 Code Like It Matters: A Guide to Secure Coding (from someone who broke it before fixing it)

🚜 Code Like It Matters: A Guide to Secure Coding (from someone who broke it before fixing it)

Comments
2 min read
Пентестинг: основы, преимущества и применение

Пентестинг: основы, преимущества и применение

1
Comments
1 min read
Ensuring Security and Compliance in Cloud-Native AWS Environments

Ensuring Security and Compliance in Cloud-Native AWS Environments

2
Comments
3 min read
CVE-2025-48927: TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability

CVE-2025-48927: TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability

Comments
1 min read
CVE-2025-48928: TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability

CVE-2025-48928: TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability

Comments
1 min read
Was my data leaked?

Was my data leaked?

Comments
1 min read
CVE-2025-2783: Google Chromium Mojo Sandbox Escape Vulnerability

CVE-2025-2783: Google Chromium Mojo Sandbox Escape Vulnerability

Comments
2 min read
CVE-2025-4664: Google Chromium Loader Insufficient Policy Enforcement Vulnerability

CVE-2025-4664: Google Chromium Loader Insufficient Policy Enforcement Vulnerability

Comments
2 min read
CVE-2025-5419: Google Chromium V8 Out-of-Bounds Read and Write Vulnerability

CVE-2025-5419: Google Chromium V8 Out-of-Bounds Read and Write Vulnerability

Comments
1 min read
Seeking Contributors for PoC Development of My Concepts

Seeking Contributors for PoC Development of My Concepts

5
Comments
1 min read
Dreaming | TryHackMe

Dreaming | TryHackMe

2
Comments 2
6 min read
AI-Powered Cybersecurity Systems: Attack Prediction Models

AI-Powered Cybersecurity Systems: Attack Prediction Models

5
Comments 1
6 min read
The basics commands of Linux

The basics commands of Linux

Comments
1 min read
API Vulnerabilities in Symfony: Real-World Examples

API Vulnerabilities in Symfony: Real-World Examples

2
Comments
3 min read
CVE-2024-43451: Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability

CVE-2024-43451: Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability

Comments
2 min read
🛑 Still in the disk group? You’re one command from root.

🛑 Still in the disk group? You’re one command from root.

Comments
1 min read
I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

3
Comments
1 min read
Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

2
Comments
3 min read
Generative AI: The Double-Edged Sword in Cloud-Native Security

Generative AI: The Double-Edged Sword in Cloud-Native Security

1
Comments
9 min read
Trying Out PowerShell for Process Logging — Finally Something That Feels Like Real Scripting 😅

Trying Out PowerShell for Process Logging — Finally Something That Feels Like Real Scripting 😅

Comments 1
2 min read
My first portfolio in Figma

My first portfolio in Figma

1
Comments 2
3 min read
Insecure Deserialization in Symfony: How to Prevent It

Insecure Deserialization in Symfony: How to Prevent It

3
Comments
3 min read
My Journey with the Zen of Python: Learning to Code, Learning to Grow

My Journey with the Zen of Python: Learning to Code, Learning to Grow

1
Comments 1
3 min read
SSO Security Exposed: Real-World Attack Scenarios in 2025

SSO Security Exposed: Real-World Attack Scenarios in 2025

2
Comments
3 min read
CVE-2017-0144: Microsoft SMBv1 Remote Code Execution Vulnerability

CVE-2017-0144: Microsoft SMBv1 Remote Code Execution Vulnerability

1
Comments 3
1 min read
loading...