DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cyber Attack Chronicles: Types and Real-Life Examples Demystified

Cyber Attack Chronicles: Types and Real-Life Examples Demystified

7
Comments
2 min read
Data Privacy and Ethics: How to Safeguard User Data and Build Trust

Data Privacy and Ethics: How to Safeguard User Data and Build Trust

Comments
3 min read
Home for the Holidays: Staying Ahead of Cybersecurity Threats

Home for the Holidays: Staying Ahead of Cybersecurity Threats

Comments
4 min read
Ethical Hacking Roadmap 2025: Guide to Becoming a Cybersecurity Expert

Ethical Hacking Roadmap 2025: Guide to Becoming a Cybersecurity Expert

1
Comments
2 min read
10 Key Code Quality Metrics to Track

10 Key Code Quality Metrics to Track

Comments
8 min read
Understanding SNI (Server Name Indication) and Modern Encryption Solutions

Understanding SNI (Server Name Indication) and Modern Encryption Solutions

Comments
2 min read
Cloud Network Security - A Detailed Guide

Cloud Network Security - A Detailed Guide

Comments
4 min read
How to solve packet sniffing permissions

How to solve packet sniffing permissions

Comments
4 min read
Waymap: The Ultimate Web Vulnerability Scanner for Penetration Testers

Waymap: The Ultimate Web Vulnerability Scanner for Penetration Testers

6
Comments
3 min read
Find the Exact and all connected device's IPs on the virtual machine

Find the Exact and all connected device's IPs on the virtual machine

10
Comments 1
1 min read
Quantum Computing and Cybersecurity

Quantum Computing and Cybersecurity

5
Comments
3 min read
Threat Modeling in Architecture

Threat Modeling in Architecture

Comments
3 min read
BSides Austin 2024: Balancing AI Safety and Real-World Risks

BSides Austin 2024: Balancing AI Safety and Real-World Risks

7
Comments 1
6 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
Why Cybersecurity Starts with Website Design and Development

Why Cybersecurity Starts with Website Design and Development

Comments
4 min read
Cybersecurity in the Digital Age: Safeguarding Data in an Interconnected World

Cybersecurity in the Digital Age: Safeguarding Data in an Interconnected World

Comments
5 min read
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

Comments
1 min read
Decoding IP Addresses: Mastering Subnet Mask and CIDR Notation

Decoding IP Addresses: Mastering Subnet Mask and CIDR Notation

2
Comments 2
3 min read
Securing Cloud Environments Against Potential Extortion Threats

Securing Cloud Environments Against Potential Extortion Threats

3
Comments
3 min read
Top 10 Cybersecurity Interview Questions and Answers for 2025

Top 10 Cybersecurity Interview Questions and Answers for 2025

1
Comments
4 min read
Hacking the Network: Spying on Devices with Bettercap in Kali Linux

Hacking the Network: Spying on Devices with Bettercap in Kali Linux

6
Comments
2 min read
Top 20 Ethical Hacking Interview Questions for 2025

Top 20 Ethical Hacking Interview Questions for 2025

Comments
4 min read
Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Comments
4 min read
Mastering Information Gathering -A foundation

Mastering Information Gathering -A foundation

Comments
3 min read
It’s cybersecurity’s kryptonite: Why are you still holding it?

It’s cybersecurity’s kryptonite: Why are you still holding it?

Comments
7 min read
ARP Poisoning Explained: What It Is and How to Prevent It

ARP Poisoning Explained: What It Is and How to Prevent It

Comments
3 min read
Federated Learning: The Future of Privacy-Preserving Machine Learning

Federated Learning: The Future of Privacy-Preserving Machine Learning

Comments
2 min read
My VAPT Learning Journey

My VAPT Learning Journey

Comments
3 min read
How to build a Passkey Product, a Strategy and Design for it?

How to build a Passkey Product, a Strategy and Design for it?

Comments
3 min read
Secure-by-Design: How AWS, Microsoft, and Others Are Embracing CISA's Cyber Goals

Secure-by-Design: How AWS, Microsoft, and Others Are Embracing CISA's Cyber Goals

11
Comments 1
2 min read
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Comments
1 min read
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data

Vulnerability Remediation: The Key to Safeguarding Your Systems and Data

Comments
3 min read
Preventing XML External Entity (XXE) Injection in Laravel Applications

Preventing XML External Entity (XXE) Injection in Laravel Applications

1
Comments
3 min read
Nexus Network Testnet: A Revolution in Blockchain and Cybersecurity

Nexus Network Testnet: A Revolution in Blockchain and Cybersecurity

1
Comments
3 min read
How to fix virsh start access error

How to fix virsh start access error

Comments
4 min read
6 Ways to Prevent Triangulation Fraud

6 Ways to Prevent Triangulation Fraud

4
Comments 1
15 min read
How to Design Robust AI Systems Against Prompt Injection Attacks

How to Design Robust AI Systems Against Prompt Injection Attacks

Comments
3 min read
Remote Code Execution (RCE) in Laravel: Prevention & Example

Remote Code Execution (RCE) in Laravel: Prevention & Example

1
Comments
3 min read
Meow Ransomware: When Cats Aren’t as Cute as They Seem

Meow Ransomware: When Cats Aren’t as Cute as They Seem

1
Comments
4 min read
Understanding SSH and Reverse SSH: A Guide for Beginners

Understanding SSH and Reverse SSH: A Guide for Beginners

3
Comments
3 min read
Deus in Machina: Pinging Jesus in the Digital Confessional

Deus in Machina: Pinging Jesus in the Digital Confessional

Comments
5 min read
ISO 42001: What Is It, and 7 Steps to Comply

ISO 42001: What Is It, and 7 Steps to Comply

Comments
9 min read
Segurança de servidores remotos

Segurança de servidores remotos

Comments
1 min read
DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

Comments
6 min read
How to Update SSL Certificate in SafeLine WAF through a File

How to Update SSL Certificate in SafeLine WAF through a File

7
Comments
1 min read
Should you STOP using VPN for Security ?

Should you STOP using VPN for Security ?

17
Comments
1 min read
Best Cyber Security Courses After 12th: 2025 Guide

Best Cyber Security Courses After 12th: 2025 Guide

Comments
3 min read
Fix Security Misconfigurations in Laravel for Safer Web Apps

Fix Security Misconfigurations in Laravel for Safer Web Apps

Comments
3 min read
Outdated TLS/SSL in Healthcare: The Open Ransomware Risk

Outdated TLS/SSL in Healthcare: The Open Ransomware Risk

Comments
7 min read
Integrating AI in Microsoft 365: A Look at Copilot and AI-Driven Features

Integrating AI in Microsoft 365: A Look at Copilot and AI-Driven Features

Comments
3 min read
Splunk - SSH Dashboard Creation

Splunk - SSH Dashboard Creation

Comments
2 min read
Click with Caution: A Beginner’s Guide to Cybersecurity

Click with Caution: A Beginner’s Guide to Cybersecurity

3
Comments 1
4 min read
Preventing File Inclusion Vulnerabilities in Laravel Applications

Preventing File Inclusion Vulnerabilities in Laravel Applications

2
Comments 1
2 min read
DNS Spoofing: Controlling DNS Requests on the Network

DNS Spoofing: Controlling DNS Requests on the Network

Comments
3 min read
THREAT INTELLIGENCE

THREAT INTELLIGENCE

Comments
1 min read
Selenium CAPTCHA Bypass: Tokens vs. Clicks — Which One’s Faster?

Selenium CAPTCHA Bypass: Tokens vs. Clicks — Which One’s Faster?

Comments
3 min read
Caught in the Crunch My Journey from Snacks to 2 Million Exposed Users Privacy

Caught in the Crunch My Journey from Snacks to 2 Million Exposed Users Privacy

17
Comments
3 min read
Prevent Sensitive Data Exposure in Laravel: Best Practices

Prevent Sensitive Data Exposure in Laravel: Best Practices

Comments
3 min read
Apa itu Damn Vulnerable Web Application (DVWA) ?

Apa itu Damn Vulnerable Web Application (DVWA) ?

Comments
3 min read
How to utilize Nmap script categories for vulnerability assessment in Cybersecurity?

How to utilize Nmap script categories for vulnerability assessment in Cybersecurity?

Comments
5 min read
loading...