DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

Comments
1 min read
$10 to Get a Powerful, Non-Signature-based WAF

$10 to Get a Powerful, Non-Signature-based WAF

5
Comments
1 min read
How to Create an Architecture with WAF in between Two Nginx

How to Create an Architecture with WAF in between Two Nginx

5
Comments
2 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
The Internet’s Roadmap: Discovering Network Routes with Traceroute

The Internet’s Roadmap: Discovering Network Routes with Traceroute

20
Comments
3 min read
LetsDefend SIEM Alert: Phising URL Detected - EventID: 86

LetsDefend SIEM Alert: Phising URL Detected - EventID: 86

Comments
5 min read
The Urgent Need for You to Be Security Conscious

The Urgent Need for You to Be Security Conscious

Comments
2 min read
Is Your ServiceNow Integration Strategy Up to Date? 5 Surprising Benefits You Didn’t Know

Is Your ServiceNow Integration Strategy Up to Date? 5 Surprising Benefits You Didn’t Know

Comments
5 min read
Bowled Over by Hackers: What Cricket Teaches Us About Cybersecurity 🏏💻

Bowled Over by Hackers: What Cricket Teaches Us About Cybersecurity 🏏💻

Comments 2
2 min read
Discovering DNS: A Beginner’s Introduction to nslookup

Discovering DNS: A Beginner’s Introduction to nslookup

11
Comments
3 min read
Could Drosera Traps Have Prevented Bybit’s $1.4 Billion Hack?

Could Drosera Traps Have Prevented Bybit’s $1.4 Billion Hack?

5
Comments
6 min read
Practical SQL Injection Exploitation Cheat Sheet - @verylazytech

Practical SQL Injection Exploitation Cheat Sheet - @verylazytech

5
Comments
3 min read
Khai thác lỗ hổng web tự động bằng AI

Khai thác lỗ hổng web tự động bằng AI

Comments
16 min read
$35,000 Bounty: How Inappropriate Access Control Led to GitLab Account Takeover

$35,000 Bounty: How Inappropriate Access Control Led to GitLab Account Takeover

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.