DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How my Kid’s tablet turned me into a Cybersecurity Analyst

How my Kid’s tablet turned me into a Cybersecurity Analyst

Comments 1
2 min read
What to do if you forgot your SafeLine WAF login password?

What to do if you forgot your SafeLine WAF login password?

6
Comments
1 min read
What is Splunk Infrastructure Monitoring?

What is Splunk Infrastructure Monitoring?

Comments
3 min read
De LLM jailbreaking a 1-click session hijacking

De LLM jailbreaking a 1-click session hijacking

3
Comments
3 min read
Operation Golden Arches: A Playful Hacker's Deep Dive into McDonald's Deal Exploits

Operation Golden Arches: A Playful Hacker's Deep Dive into McDonald's Deal Exploits

2
Comments 1
4 min read
Scope of Cloud Security Solutions in 2025

Scope of Cloud Security Solutions in 2025

Comments
4 min read
Boas Práticas de Segurança e Qualidade no Terraform

Boas Práticas de Segurança e Qualidade no Terraform

1
Comments
3 min read
On-Premise vs. Cloud Logging: Pros, Cons, and Use Cases

On-Premise vs. Cloud Logging: Pros, Cons, and Use Cases

Comments
15 min read
How to Know if a Platform is Fake/Scam: Protect Yourself from Online Fraud

How to Know if a Platform is Fake/Scam: Protect Yourself from Online Fraud

3
Comments 3
4 min read
Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Comments
2 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Comments
1 min read
AWS WAF: Keeping Your Web Applications Secure

AWS WAF: Keeping Your Web Applications Secure

Comments
3 min read
Web3 Operational Security: Lessons from the Bybit $1.4B Wallet Safe Hack

Web3 Operational Security: Lessons from the Bybit $1.4B Wallet Safe Hack

1
Comments 5
16 min read
Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Comments
6 min read
Setting up a pentest lab with an Android Phone and Kali Linux

Setting up a pentest lab with an Android Phone and Kali Linux

1
Comments
7 min read
What Happens When Apps Collect Too Much User Data?

What Happens When Apps Collect Too Much User Data?

1
Comments
11 min read
Cyber Attacks

Cyber Attacks

Comments
2 min read
Quantum Key Distribution: A Beginner’s Guide

Quantum Key Distribution: A Beginner’s Guide

Comments
15 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
WhoWeB Scanner - Simple Website Scanner Tool

WhoWeB Scanner - Simple Website Scanner Tool

Comments
1 min read
TryHackMe: HTTP/2 Request Smuggling

TryHackMe: HTTP/2 Request Smuggling

Comments
14 min read
Upgrading wazuh 4.11.0 using docker in single node

Upgrading wazuh 4.11.0 using docker in single node

1
Comments
1 min read
TryHackMe: HTTP Request Smuggling

TryHackMe: HTTP Request Smuggling

1
Comments
3 min read
How to Ensure AWS S3 Bucket Security Best Practices

How to Ensure AWS S3 Bucket Security Best Practices

1
Comments
1 min read
Top 10 European Open-Source Projects to Watch in 2025

Top 10 European Open-Source Projects to Watch in 2025

7
Comments
26 min read
loading...