DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Comments
3 min read
Understanding QUIC and HTTP3 What's the Difference between HTTP2 and HTTP3

Understanding QUIC and HTTP3 What's the Difference between HTTP2 and HTTP3

Comments
4 min read
10 Free Vulnerability Scanners Every Developer Should Know in 2025

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Comments
2 min read
Web Server NIGHTMARE

Web Server NIGHTMARE

Comments
5 min read
Zero-Trust Security: Buzzword or Cybersecurity Game-Changer?

Zero-Trust Security: Buzzword or Cybersecurity Game-Changer?

Comments
2 min read
🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security

🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security

Comments
2 min read
📘 Cybersecurity Roadmap – A Comprehensive Guide to Begin Your Journey

📘 Cybersecurity Roadmap – A Comprehensive Guide to Begin Your Journey

Comments
1 min read
TryHackMe: Yara

TryHackMe: Yara

Comments
10 min read
TryHackMe: Threat Intelligence Tools

TryHackMe: Threat Intelligence Tools

Comments
6 min read
Countering security threats: Contactless payment

Countering security threats: Contactless payment

Comments
2 min read
Degradación del protocolo de comunicación en IoT mediante un ataque de hombre en el medio (MitM)

Degradación del protocolo de comunicación en IoT mediante un ataque de hombre en el medio (MitM)

Comments
5 min read
Securing Kubernetes Using Honeypots to Detect and Prevent Lateral Movement Attacks

Securing Kubernetes Using Honeypots to Detect and Prevent Lateral Movement Attacks

Comments 1
3 min read
The Inflation of "Security Researchers" and Its Consequences for Open Source

The Inflation of "Security Researchers" and Its Consequences for Open Source

Comments
6 min read
What’s the Best Path for a Beginner: Backend Development or Cybersecurity?

What’s the Best Path for a Beginner: Backend Development or Cybersecurity?

Comments
1 min read
The Pervasive Impact of Ransomware on Cybersecurity.

The Pervasive Impact of Ransomware on Cybersecurity.

Comments
19 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
Fidenza's Role in Cyberwar: Art, NFTs, and Cybersecurity Convergence

Fidenza's Role in Cyberwar: Art, NFTs, and Cybersecurity Convergence

Comments
8 min read
CRLF Injection in Laravel: Exploit and Prevention Guide

CRLF Injection in Laravel: Exploit and Prevention Guide

7
Comments
3 min read
Red vs Blue vs Purple: The Colorful World of Cybersecurity

Red vs Blue vs Purple: The Colorful World of Cybersecurity

14
Comments 1
2 min read
Securing Digital Interactions: Understanding RSA Encryption

Securing Digital Interactions: Understanding RSA Encryption

Comments
5 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

Comments
7 min read
Navigating the Cyber Dimensions of CloneX and Digital Assets: A Holistic Examination

Navigating the Cyber Dimensions of CloneX and Digital Assets: A Holistic Examination

Comments
8 min read
Solana Blockchain and Its Use cases

Solana Blockchain and Its Use cases

Comments
4 min read
The Rise of Fragment Telegram Scams: What You Need to Know

The Rise of Fragment Telegram Scams: What You Need to Know

Comments
9 min read
Final Year Cybersecurity Project Ideas with source code.

Final Year Cybersecurity Project Ideas with source code.

Comments
1 min read
loading...