DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is NAS? Does NAS Need a WAF?

What is NAS? Does NAS Need a WAF?

5
Comments
3 min read
Step-by-Step Guide: Deploying SafeLine WAF on Synology NAS Using Docker

Step-by-Step Guide: Deploying SafeLine WAF on Synology NAS Using Docker

5
Comments
4 min read
Open Redirect Vulnerability: Exploitation, Prevention & Real-World Examples - @verylazytech

Open Redirect Vulnerability: Exploitation, Prevention & Real-World Examples - @verylazytech

5
Comments
1 min read
$35,000 Bounty: How Inappropriate Access Control Led to GitLab Account Takeover

$35,000 Bounty: How Inappropriate Access Control Led to GitLab Account Takeover

Comments
1 min read
Cybersecurity Applications of Image Classification

Cybersecurity Applications of Image Classification

1
Comments
4 min read
Fix OAuth Misconfigurations in Laravel: Best Practices

Fix OAuth Misconfigurations in Laravel: Best Practices

2
Comments
3 min read
Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Comments
4 min read
Understanding Password Attacks and Key Indicators of Compromise

Understanding Password Attacks and Key Indicators of Compromise

Comments
6 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
Deepfake Detection in the Digital Age: A Developer's Approach to Authenticity

Deepfake Detection in the Digital Age: A Developer's Approach to Authenticity

Comments
2 min read
Splunk Boss of the SOC- Corelight trickbot ctf

Splunk Boss of the SOC- Corelight trickbot ctf

Comments
5 min read
25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

Comments
1 min read
$10 to Get a Powerful, Non-Signature-based WAF

$10 to Get a Powerful, Non-Signature-based WAF

5
Comments
1 min read
How to Create an Architecture with WAF in between Two Nginx

How to Create an Architecture with WAF in between Two Nginx

5
Comments
2 min read
Ranga Premsai Joins Forbes Technology Council: A Step Forward in Cybersecurity Leadership

Ranga Premsai Joins Forbes Technology Council: A Step Forward in Cybersecurity Leadership

Comments
3 min read
Securing Flight Paths: A Developer's Guide to Mitigating DDoS Attacks in Aviation

Securing Flight Paths: A Developer's Guide to Mitigating DDoS Attacks in Aviation

Comments
2 min read
Prevent Business Logic Vulnerabilities in Laravel

Prevent Business Logic Vulnerabilities in Laravel

2
Comments
3 min read
Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Comments
1 min read
The Urgent Need for You to Be Security Conscious

The Urgent Need for You to Be Security Conscious

Comments
2 min read
Is Your ServiceNow Integration Strategy Up to Date? 5 Surprising Benefits You Didn’t Know

Is Your ServiceNow Integration Strategy Up to Date? 5 Surprising Benefits You Didn’t Know

Comments
5 min read
Could Drosera Traps Have Prevented Bybit’s $1.4 Billion Hack?

Could Drosera Traps Have Prevented Bybit’s $1.4 Billion Hack?

5
Comments
6 min read
🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

5
Comments
1 min read
Top Hacking Gadgets for 2025 - @verylazytech

Top Hacking Gadgets for 2025 - @verylazytech

5
Comments
1 min read
Advanced Diploma in Artificial Intelligence and Machine Learning

Advanced Diploma in Artificial Intelligence and Machine Learning

Comments
4 min read
AI in Vulnerability Scanners: Transforming Cybersecurity Threat Detection

AI in Vulnerability Scanners: Transforming Cybersecurity Threat Detection

Comments
4 min read
loading...