DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Customize the SafeLine Auth Challenge Page

How to Customize the SafeLine Auth Challenge Page

6
Comments
2 min read
Data Security: Why Your Business Can't Afford to Ignore It

Data Security: Why Your Business Can't Afford to Ignore It

Comments
3 min read
From Traditional Encryption to Post-Quantum Solutions: Evolving Cryptography for Modern Networks

From Traditional Encryption to Post-Quantum Solutions: Evolving Cryptography for Modern Networks

Comments
9 min read
Cybr - [LAB] [Challenge] Create a VPC with public and private subnets

Cybr - [LAB] [Challenge] Create a VPC with public and private subnets

Comments
9 min read
I'm Building a "Copilot for Hackers", But I'm Forcing it to Be Dumb

I'm Building a "Copilot for Hackers", But I'm Forcing it to Be Dumb

1
Comments
3 min read
🚀 Yesterday we had the opportunity to attend the funding workshop of the NATO DIANA acceleration program, held at INCIBE in León

🚀 Yesterday we had the opportunity to attend the funding workshop of the NATO DIANA acceleration program, held at INCIBE in León

1
Comments
1 min read
How the Cold War Influenced the Birth of the World's Most Used Internet Protocol

How the Cold War Influenced the Birth of the World's Most Used Internet Protocol

1
Comments 1
2 min read
[GameDev] Unity3D, C# and String Security (PT-BR)

[GameDev] Unity3D, C# and String Security (PT-BR)

Comments
16 min read
Computer Crime Investigation

Computer Crime Investigation

Comments
1 min read
CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

Comments
1 min read
Solving TryHackMe's "Vulnerability Capstone" Room - A Complete Walkthrough

Solving TryHackMe's "Vulnerability Capstone" Room - A Complete Walkthrough

Comments
3 min read
วิธีใช้ OWASP ZAP ทดสอบความปลอดภัยของเว็บแอปพลิเคชัน โดยใช้ OWASP Juice Shop

วิธีใช้ OWASP ZAP ทดสอบความปลอดภัยของเว็บแอปพลิเคชัน โดยใช้ OWASP Juice Shop

Comments
2 min read
Top Apple Device Management Software for 2025 | Easy & Secure

Top Apple Device Management Software for 2025 | Easy & Secure

Comments
4 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Comments
6 min read
Enterprise-Level Identity Auth in a Self-Hosted WAF, SafeLine (and it's Free)

Enterprise-Level Identity Auth in a Self-Hosted WAF, SafeLine (and it's Free)

5
Comments
2 min read
Best Online Resources to Pass Any Palo Alto Certification Exam

Best Online Resources to Pass Any Palo Alto Certification Exam

Comments 1
4 min read
OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

5
Comments
2 min read
Critical Next.js Middleware Bypass Affects Popular AI Apps (CVE-2025-29927)

Critical Next.js Middleware Bypass Affects Popular AI Apps (CVE-2025-29927)

6
Comments
3 min read
🚀 Back online – and getting ready for what’s next.

🚀 Back online – and getting ready for what’s next.

Comments 1
1 min read
🧪 Exploiting Blind SQL Injection by Triggering Time Delays

🧪 Exploiting Blind SQL Injection by Triggering Time Delays

Comments 1
3 min read
🕵️‍♂️ I Found a Telegram Bot That Handles Fake Emails Like a Pro (And I Had to Talk About It)

🕵️‍♂️ I Found a Telegram Bot That Handles Fake Emails Like a Pro (And I Had to Talk About It)

Comments
2 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Comments
2 min read
Hack Happens. Are You Ready to Respond?

Hack Happens. Are You Ready to Respond?

8
Comments 4
3 min read
Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography

Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography

3
Comments
7 min read
🔐 June: Password Management Month – Strengthen Your Digital Locks

🔐 June: Password Management Month – Strengthen Your Digital Locks

Comments
2 min read
loading...