DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
China Cracks Small RSA Key with Quantum Computer – What It Means for Our Digital Future

China Cracks Small RSA Key with Quantum Computer – What It Means for Our Digital Future

Comments
2 min read
Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

1
Comments
4 min read
How Does Public Key Cryptography Work?

How Does Public Key Cryptography Work?

Comments
3 min read
Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)

Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)

15
Comments
2 min read
The God Mode Vulnerability That Should Kill "Trust Microsoft"

The God Mode Vulnerability That Should Kill "Trust Microsoft"

2
Comments
7 min read
Analysis of the ROGUE Agent-Based Automated Web Testing System

Analysis of the ROGUE Agent-Based Automated Web Testing System

Comments
5 min read
Shifting Security Left: Why DevSecOps is Not Optional Anymore

Shifting Security Left: Why DevSecOps is Not Optional Anymore

1
Comments
3 min read
Top 10 OSINT Tools Every (Ethical) Hacker Should Know

Top 10 OSINT Tools Every (Ethical) Hacker Should Know

2
Comments
4 min read
CiberIA Auditor: Technical Simulation of an AI Security Assessment

CiberIA Auditor: Technical Simulation of an AI Security Assessment

Comments
3 min read
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Comments
1 min read
ZoomEye vs. Other Search Engines: Why It’s the Top Choice for Security Researchers

ZoomEye vs. Other Search Engines: Why It’s the Top Choice for Security Researchers

1
Comments
2 min read
🌐 OSI Model vs TCP/IP Model: Beginner-Friendly Guide

🌐 OSI Model vs TCP/IP Model: Beginner-Friendly Guide

1
Comments 1
2 min read
WinRAR 0-Day Exploit

WinRAR 0-Day Exploit

Comments
3 min read
Como uma Ligação Falsa do Suporte Google e 2FA Sincronizado na Nuvem Custou US$130.000 a um Desenvolvedor

Como uma Ligação Falsa do Suporte Google e 2FA Sincronizado na Nuvem Custou US$130.000 a um Desenvolvedor

Comments
2 min read
Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

1
Comments
12 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.