DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Generative AI in Action: Real Business Problems, Smarter Solutions

Generative AI in Action: Real Business Problems, Smarter Solutions

Comments
5 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Comments
2 min read
CPS 234 Compliance in 2025: Essential Steps for Australian Financial Sector Security

CPS 234 Compliance in 2025: Essential Steps for Australian Financial Sector Security

Comments
3 min read
Web Application Penetration Testing: How to Hack Like a Hacker (Before You Find You)

Web Application Penetration Testing: How to Hack Like a Hacker (Before You Find You)

2
Comments
3 min read
Diary of a Firewall: Facing Thousands of Threats Every Day

Diary of a Firewall: Facing Thousands of Threats Every Day

Comments
3 min read
🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible

🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible

Comments
2 min read
Advanced Web Security Best Practices: Securing Your Web Apps against Today's Threats

Advanced Web Security Best Practices: Securing Your Web Apps against Today's Threats

1
Comments
3 min read
Master Real-World Attack Detection with This Open Source WAF

Master Real-World Attack Detection with This Open Source WAF

7
Comments 1
3 min read
The Ultimate Guide to SSH Hardening: Secure Your Remote Access

The Ultimate Guide to SSH Hardening: Secure Your Remote Access

1
Comments
4 min read
Building Rate Limiting That Actually Works

Building Rate Limiting That Actually Works

3
Comments 2
8 min read
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

8
Comments 1
3 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide

How to Prevent Phishing Attacks: A Technical Implementation Guide

Comments
2 min read
Cybersecurity worm WannaCry

Cybersecurity worm WannaCry

Comments
1 min read
Zero Trust, One Router: Hardening Your Home Lab Like a Cyber Fortress.

Zero Trust, One Router: Hardening Your Home Lab Like a Cyber Fortress.

Comments
20 min read
Kali Linux Labs: Nmap Reconnaissance, User Management, and Nikto Web Vulnerability Scanning

Kali Linux Labs: Nmap Reconnaissance, User Management, and Nikto Web Vulnerability Scanning

2
Comments
2 min read
Lessons Learned: My First Ethical Hack with TryHackMe's "Offensive Security Intro"

Lessons Learned: My First Ethical Hack with TryHackMe's "Offensive Security Intro"

2
Comments
2 min read
WharpDOS – I Built an ARP-Based DoS Tool in Python to Learn Network Attacks (Ethically)

WharpDOS – I Built an ARP-Based DoS Tool in Python to Learn Network Attacks (Ethically)

Comments
2 min read
Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Comments
2 min read
HackThisSite Basic 1

HackThisSite Basic 1

Comments
1 min read
Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models

Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models

5
Comments 1
2 min read
7 Leading MDR Solutions: Enhancing Your Security Posture

7 Leading MDR Solutions: Enhancing Your Security Posture

Comments
7 min read
Unleashing AI: Revolutionizing Digital Forensics and Incident Response

Unleashing AI: Revolutionizing Digital Forensics and Incident Response

2
Comments 1
7 min read
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
What Is JA4 Fingerprinting and Why It Matters for WAFs

What Is JA4 Fingerprinting and Why It Matters for WAFs

6
Comments
2 min read
Cloudflare’s JA4 Fingerprinting: Smarter Threat Detection Through TLS

Cloudflare’s JA4 Fingerprinting: Smarter Threat Detection Through TLS

5
Comments
2 min read
loading...