DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🌟 Mass Lead Validation is Coming to Dymo API! 🚀

🌟 Mass Lead Validation is Coming to Dymo API! 🚀

1
Comments
1 min read
My Journey with SafeLine: A Practical Tool for Web Security

My Journey with SafeLine: A Practical Tool for Web Security

5
Comments
2 min read
How I Conquered the CISSP Exam

How I Conquered the CISSP Exam

Comments
2 min read
SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

5
Comments
2 min read
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

8
Comments
3 min read
Why Virtual Training with Microsoft Certified Trainers is a Game-Changer for Microsoft 365 Certification

Why Virtual Training with Microsoft Certified Trainers is a Game-Changer for Microsoft 365 Certification

Comments
2 min read
TryHackMe: XXE Injection

TryHackMe: XXE Injection

1
Comments
15 min read
TryHackMe: Advanced SQL Injection

TryHackMe: Advanced SQL Injection

2
Comments
24 min read
How to protect yourself against cyber threats

How to protect yourself against cyber threats

Comments
3 min read
How to Create Secure and Scalable Web Applications with MERN

How to Create Secure and Scalable Web Applications with MERN

Comments
3 min read
Cybersecurity Certifications: Your Guide to a Successful Career

Cybersecurity Certifications: Your Guide to a Successful Career

Comments
2 min read
2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

6
Comments
1 min read
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Comments
3 min read
TryHackMe: OAuth Vulnerabilities

TryHackMe: OAuth Vulnerabilities

1
Comments
13 min read
TryHackMe: JWT Security

TryHackMe: JWT Security

4
Comments
7 min read
Prevent Session Replay Attacks in Laravel: A Complete Guide

Prevent Session Replay Attacks in Laravel: A Complete Guide

3
Comments
4 min read
Hardware Entropy: The Hidden Foundation of Modern Cryptography

Hardware Entropy: The Hidden Foundation of Modern Cryptography

1
Comments
5 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
Alternatif Web Application Firewall (WAF) untuk Website: Gratis, Berbayar, dan Open-Source

Alternatif Web Application Firewall (WAF) untuk Website: Gratis, Berbayar, dan Open-Source

Comments
2 min read
TryHackMe: Jr Penetration Tester Notes

TryHackMe: Jr Penetration Tester Notes

2
Comments
36 min read
TryHackMe: Enumeration & Brute Force

TryHackMe: Enumeration & Brute Force

Comments
2 min read
Importance of Regular Security Audits for Compliance and Cyber Resilience

Importance of Regular Security Audits for Compliance and Cyber Resilience

Comments
4 min read
Ethical WiFi Hacking with Termux: A Guide to Wipwn

Ethical WiFi Hacking with Termux: A Guide to Wipwn

Comments
3 min read
Dog Hack the Box Writeup

Dog Hack the Box Writeup

4
Comments 1
3 min read
The High Cost of Trust: How Data Breaches Damage Healthcare Organizations

The High Cost of Trust: How Data Breaches Damage Healthcare Organizations

Comments
3 min read
loading...