DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enhancing Web Security with Content Security Policy (CSP)

Enhancing Web Security with Content Security Policy (CSP)

Comments
2 min read
How to Get Real IPs Through FRP with SafeLine WAF

How to Get Real IPs Through FRP with SafeLine WAF

5
Comments
4 min read
How WAFs Work + One You Should Try

How WAFs Work + One You Should Try

5
Comments
3 min read
🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

Comments
2 min read
How Hackers Attack Web Apps — and How You Can Stop Them

How Hackers Attack Web Apps — and How You Can Stop Them

Comments
3 min read
The Art of Cyber Deception: Why Thinking Like a Liar Can Make You a Better Defender

The Art of Cyber Deception: Why Thinking Like a Liar Can Make You a Better Defender

Comments
2 min read
Shell scripting -001

Shell scripting -001

4
Comments
2 min read
Critical RCE Flaw Found in Qiyuesuo PDF Verifier – Patch Now!

Critical RCE Flaw Found in Qiyuesuo PDF Verifier – Patch Now!

5
Comments 1
2 min read
Day 00: Starting a Cybersecurity Phishing Game

Day 00: Starting a Cybersecurity Phishing Game

Comments
2 min read
CVE-2024-36401: OSGeo GeoServer GeoTools Eval Injection Vulnerability

CVE-2024-36401: OSGeo GeoServer GeoTools Eval Injection Vulnerability

Comments
2 min read
Evil-GPT V2 Room | TryHackMe

Evil-GPT V2 Room | TryHackMe

Comments
3 min read
Social engineering (Human Hacking)

Social engineering (Human Hacking)

Comments
2 min read
QRTrust: Privacy-First QR Scanner with Phishing Detection

QRTrust: Privacy-First QR Scanner with Phishing Detection

Comments
3 min read
Fake Job Offers Are Turning GitHub Repos Into a Trap

Fake Job Offers Are Turning GitHub Repos Into a Trap

1
Comments
5 min read
Deploying SafeLine WAF on Kubernetes: A Beginner-Friendly Guide

Deploying SafeLine WAF on Kubernetes: A Beginner-Friendly Guide

5
Comments
3 min read
TryHackMe Pickle Rick Walkthrough | Complete Beginner’s Guide

TryHackMe Pickle Rick Walkthrough | Complete Beginner’s Guide

Comments
4 min read
The Lazarus Hackers: Everything You Know Is a Lie

The Lazarus Hackers: Everything You Know Is a Lie

5
Comments
5 min read
Beyond CVE: Building a Complete Vulnerability Intelligence Pipeline

Beyond CVE: Building a Complete Vulnerability Intelligence Pipeline

Comments
4 min read
What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

1
Comments
5 min read
Secure Your MQTT Client in C# with Basic Authentication

Secure Your MQTT Client in C# with Basic Authentication

Comments
1 min read
Protege tu cliente MQTT en C# con autenticación básica

Protege tu cliente MQTT en C# con autenticación básica

Comments
2 min read
Critical GeoServer RCE Vulnerability (CVE-2024-36401) — No Auth Needed

Critical GeoServer RCE Vulnerability (CVE-2024-36401) — No Auth Needed

6
Comments
3 min read
How to become a “HACKER”

How to become a “HACKER”

Comments
2 min read
🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL

🧠⚔️ CyberNexus: A Futuristic AI-Powered Cybersecurity Operations Center — Built with React, Express & PostgreSQL

Comments
3 min read
Tech Debt Is Real: The Internet Runs on 30-Year-Old Code

Tech Debt Is Real: The Internet Runs on 30-Year-Old Code

Comments
4 min read
loading...