DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)

6
Comments
2 min read
What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

What is Dangling DNS? (And How It Can Lead to Domain Takeovers)

2
Comments
2 min read
I got 99 problems, but a breach ain’t one

I got 99 problems, but a breach ain’t one

1
Comments
5 min read
OAuth Misconfiguration in Symfony Explained

OAuth Misconfiguration in Symfony Explained

3
Comments
3 min read
Future proofing your platform

Future proofing your platform

1
Comments
5 min read
SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

SafeLine WAF vs. Cloudflare & ModSecurity: Who Wins in Real-World Tests?

6
Comments
2 min read
🛡️ Cybersecurity Review Guide for React & Vite Applications

🛡️ Cybersecurity Review Guide for React & Vite Applications

Comments
2 min read
Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

Breaking Into the Machine: IoT Penetration Testing Techniques and Strategies

1
Comments
2 min read
Using SBOMs to detect possible Dependency Confusion

Using SBOMs to detect possible Dependency Confusion

Comments 1
4 min read
Remotely Control Any Computer with Mythic C2 and Discord | Step-by-Step Ethical Hacking Guide

Remotely Control Any Computer with Mythic C2 and Discord | Step-by-Step Ethical Hacking Guide

2
Comments
4 min read
The Ultimate Fusion: Linux, Ubuntu, and Cybersecurity | by Faruk Ahmed | Jun, 2025

The Ultimate Fusion: Linux, Ubuntu, and Cybersecurity | by Faruk Ahmed | Jun, 2025

1
Comments
1 min read
CVE-2025-20337: Cisco Identity Services Engine Injection Vulnerability

CVE-2025-20337: Cisco Identity Services Engine Injection Vulnerability

2
Comments
1 min read
CVE-2025-20281: Cisco Identity Services Engine Injection Vulnerability

CVE-2025-20281: Cisco Identity Services Engine Injection Vulnerability

2
Comments
1 min read
How to Use SafePoint Cyber Threat Intelligence API

How to Use SafePoint Cyber Threat Intelligence API

5
Comments
4 min read
Building Bulletproof On-Demand Apps in 2025: Cybersecurity Best Practices for Developers

Building Bulletproof On-Demand Apps in 2025: Cybersecurity Best Practices for Developers

1
Comments
7 min read
Breaking Into the Machine: A Deep Dive Into Automotive Penetration Testing Techniques

Breaking Into the Machine: A Deep Dive Into Automotive Penetration Testing Techniques

1
Comments
3 min read
Meet the Open-Source WAF Trusted by Top Engineers to Block Real-World Attacks

Meet the Open-Source WAF Trusted by Top Engineers to Block Real-World Attacks

5
Comments
3 min read
Mastering the Art of Online Investigation: TryHackMe's "Search Skills" Walkthrough

Mastering the Art of Online Investigation: TryHackMe's "Search Skills" Walkthrough

Comments
3 min read
The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

Comments
7 min read
Cybersecurity Deep Dive: Security Vulnerability

Cybersecurity Deep Dive: Security Vulnerability

1
Comments 2
1 min read
Detecting Business Logic Flaws in Symfony Apps

Detecting Business Logic Flaws in Symfony Apps

4
Comments
4 min read
HIPAA Compliance for Developers: Why It Matters and How to Stay Aligned

HIPAA Compliance for Developers: Why It Matters and How to Stay Aligned

Comments
2 min read
ShellGPT in Cybersecurity: Your Terminal’s Silent Sentinel

ShellGPT in Cybersecurity: Your Terminal’s Silent Sentinel

Comments
3 min read
How to Protect Yourself From Malicious Links: A Complete Guide

How to Protect Yourself From Malicious Links: A Complete Guide

2
Comments
3 min read
Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

1
Comments
5 min read
loading...