DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
VM Safety Configuration: A Developer's Guide

VM Safety Configuration: A Developer's Guide

Comments
6 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities

The Real Reason Most Pentests Miss Critical Vulnerabilities

1
Comments
3 min read
Rubber Ducky clone with Pro Micro micro controller

Rubber Ducky clone with Pro Micro micro controller

1
Comments
4 min read
đź§Ş Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security

đź§Ş Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security

31
Comments 2
4 min read
Authentication & Security: Keeping Bad Guys Out Without Annoying Users

Authentication & Security: Keeping Bad Guys Out Without Annoying Users

2
Comments
8 min read
Subdomain Takeover

Subdomain Takeover

2
Comments
6 min read
The Assessor's Gambit: A Deep Dive into White, Gray, and Black Box Penetration Testing

The Assessor's Gambit: A Deep Dive into White, Gray, and Black Box Penetration Testing

3
Comments
8 min read
Frontend Devs: Weaponize Beauty. Build UIs That Command Respect

Frontend Devs: Weaponize Beauty. Build UIs That Command Respect

10
Comments 1
9 min read
Arquitetura da Proteção de Dados: Encoding, Hashing e Criptografia

Arquitetura da Proteção de Dados: Encoding, Hashing e Criptografia

Comments
6 min read
Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Comments
2 min read
Beyond "The End of Cybersecurity": Refusal as Default Architecture

Beyond "The End of Cybersecurity": Refusal as Default Architecture

2
Comments 3
12 min read
Cybersecurity Weekly #8: Securing Remote Collaboration for Freelancers & Virtual Teams in 2025

Cybersecurity Weekly #8: Securing Remote Collaboration for Freelancers & Virtual Teams in 2025

1
Comments
3 min read
IoT Security in the 5G Era: How Connected Devices Became the New Attack Surface

IoT Security in the 5G Era: How Connected Devices Became the New Attack Surface

6
Comments
7 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
Reverse Methods for Obtaining Phone Numbers and Preventive Measures

Reverse Methods for Obtaining Phone Numbers and Preventive Measures

2
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.