DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Your UEBA Isn’t Working (and how to fix it)

Why Your UEBA Isn’t Working (and how to fix it)

1
Comments
7 min read
The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

3
Comments
5 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
Queen City Con 0x3: Hacking And Embracing Resiliency

Queen City Con 0x3: Hacking And Embracing Resiliency

Comments
8 min read
It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

Comments
5 min read
SafeLine: The Open-Source WAF That Actually Protects Your Web Apps

SafeLine: The Open-Source WAF That Actually Protects Your Web Apps

Comments
4 min read
Hands-On TLS: Inspect Certificates, Verify PFS, and Build a Local HTTPS Server

Hands-On TLS: Inspect Certificates, Verify PFS, and Build a Local HTTPS Server

9
Comments
2 min read
Why Identity Threat Detection & Response (ITDR) Is Becoming Essential in Modern Security

Why Identity Threat Detection & Response (ITDR) Is Becoming Essential in Modern Security

Comments
3 min read
How to Build India's Cheapest (Yet Most Effective) Penetration Testing Tool 🔥

How to Build India's Cheapest (Yet Most Effective) Penetration Testing Tool 🔥

Comments
7 min read
Plataforma Para Reportar Golpes: Cyber Alerts 🛡️

Plataforma Para Reportar Golpes: Cyber Alerts 🛡️

1
Comments
1 min read
My Writeup (0day in Zsh (RCE))

My Writeup (0day in Zsh (RCE))

11
Comments 1
5 min read
Indirect Prompt Injection: The Sneaky AI Vulnerability You Need to Know

Indirect Prompt Injection: The Sneaky AI Vulnerability You Need to Know

5
Comments
5 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
Hands-On: See Image Metadata Removal in Action

Hands-On: See Image Metadata Removal in Action

120
Comments 2
6 min read
Why Some Android Games Resist NaĂŻve Reverse Engineering

Why Some Android Games Resist NaĂŻve Reverse Engineering

1
Comments 1
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.