DEV Community

Cybersecurity Weekly Series' Articles

Back to Cyber Safety Zone 's Series
Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Cybersecurity Weekly #2: Phishing in 2025 – How AI is Changing the Game /series

Comments
1 min read
Cybersecurity Weekly #3: Deepfakes, Phishing 2.0, and the Fight Against Digital Deception
Cover image for Cybersecurity Weekly #3: Deepfakes, Phishing 2.0, and the Fight Against Digital Deception

Cybersecurity Weekly #3: Deepfakes, Phishing 2.0, and the Fight Against Digital Deception

Comments
2 min read
Cybersecurity Weekly #5 : Keeping Freelancers Safe on Public Wi-Fi in 2025

Cybersecurity Weekly #5 : Keeping Freelancers Safe on Public Wi-Fi in 2025

1
Comments
3 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

1
Comments
2 min read
Cybersecurity Weekly #8: Securing Remote Collaboration for Freelancers & Virtual Teams in 2025

Cybersecurity Weekly #8: Securing Remote Collaboration for Freelancers & Virtual Teams in 2025

1
Comments
3 min read
Cybersecurity Weekly #9: AI-Powered Phishing Inside Collaboration Tools
Cover image for Cybersecurity Weekly #9: AI-Powered Phishing Inside Collaboration Tools

Cybersecurity Weekly #9: AI-Powered Phishing Inside Collaboration Tools

2
Comments
2 min read
Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know
Cover image for Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know

Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know

2
Comments
4 min read
What’s Next — Freelancers & AI-Generated Documents: Emerging Risks & Smart Practices for 2026”
Cover image for What’s Next — Freelancers & AI-Generated Documents: Emerging Risks & Smart Practices for 2026”

What’s Next — Freelancers & AI-Generated Documents: Emerging Risks & Smart Practices for 2026”

2
Comments
4 min read
Cybersecurity Weekly #11 — The Threats, Trends & Tools You Need to Know (2025 Edition)
Cover image for Cybersecurity Weekly #11 — The Threats, Trends & Tools You Need to Know (2025 Edition)

Cybersecurity Weekly #11 — The Threats, Trends & Tools You Need to Know (2025 Edition)

2
Comments
3 min read
Cybersecurity Weekly#12: What Developers Should Care About This Week
Cover image for Cybersecurity Weekly#12: What Developers Should Care About This Week

Cybersecurity Weekly#12: What Developers Should Care About This Week

1
Comments
2 min read
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)
Cover image for Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
Cover image for Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)

Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)

4
Comments 1
1 min read
Cybersecurity Weekly# Web3 Wallet Exploits: Protecting Your Digital Assets in 2026
Cover image for Cybersecurity Weekly# Web3 Wallet Exploits: Protecting Your Digital Assets in 2026

Cybersecurity Weekly# Web3 Wallet Exploits: Protecting Your Digital Assets in 2026

2
Comments
1 min read
Cybersecurity Weekly: How Face ID & Fingerprint Systems Get Spoofed in 2026
Cover image for Cybersecurity Weekly: How Face ID & Fingerprint Systems Get Spoofed in 2026

Cybersecurity Weekly: How Face ID & Fingerprint Systems Get Spoofed in 2026

2
Comments
2 min read
Cybersecurity Weekly: Email Security Beyond Spam Filters — DMARC, SPF & DKIM for Small Businesses in 2026
Cover image for Cybersecurity Weekly: Email Security Beyond Spam Filters — DMARC, SPF & DKIM for Small Businesses in 2026

Cybersecurity Weekly: Email Security Beyond Spam Filters — DMARC, SPF & DKIM for Small Businesses in 2026

4
Comments
2 min read
Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss
Cover image for Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss

Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss

3
Comments
2 min read
Weekly Cybersecurity Series — Part 1 : How Session Hijacking Attacks Bypass MFA in U.S. Businesses
Cover image for Weekly Cybersecurity Series — Part 1 : How Session Hijacking Attacks Bypass MFA in U.S. Businesses

Weekly Cybersecurity Series — Part 1 : How Session Hijacking Attacks Bypass MFA in U.S. Businesses

3
Comments
3 min read
Cybersecurity Weekly Series #1: How Session Hijacking Attacks Bypass MFA in U.S. Businesses
Cover image for Cybersecurity Weekly Series #1: How Session Hijacking Attacks Bypass MFA in U.S. Businesses

Cybersecurity Weekly Series #1: How Session Hijacking Attacks Bypass MFA in U.S. Businesses

3
Comments
2 min read
Cybersecurity Weekly #12: Google Workspace Security Gaps Small U.S. Businesses Don’t Realize They Have
Cover image for Cybersecurity Weekly #12: Google Workspace Security Gaps Small U.S. Businesses Don’t Realize They Have

Cybersecurity Weekly #12: Google Workspace Security Gaps Small U.S. Businesses Don’t Realize They Have

2
Comments
2 min read
Cybersecurity Weekly #3: Slack & Team Chat Security — How U.S. Businesses Get Breached Without Knowing
Cover image for Cybersecurity Weekly #3: Slack & Team Chat Security — How U.S. Businesses Get Breached Without Knowing

Cybersecurity Weekly #3: Slack & Team Chat Security — How U.S. Businesses Get Breached Without Knowing

2
Comments
2 min read
Cybersecurity Weekly Series: Browser-Based Attacks Targeting Freelancers (Chrome Extensions)
Cover image for Cybersecurity Weekly Series: Browser-Based Attacks Targeting Freelancers (Chrome Extensions)

Cybersecurity Weekly Series: Browser-Based Attacks Targeting Freelancers (Chrome Extensions)

2
Comments 1
1 min read
Cybersecurity Weekly: Why the FTC Safeguards Rule Matters for Freelancers
Cover image for Cybersecurity Weekly: Why the FTC Safeguards Rule Matters for Freelancers

Cybersecurity Weekly: Why the FTC Safeguards Rule Matters for Freelancers

1
Comments
2 min read
Cybersecurity weekly: Do U.S. Freelancers Need SOC 2? Security Requirements Clients Now Expect
Cover image for Cybersecurity weekly: Do U.S. Freelancers Need SOC 2? Security Requirements Clients Now Expect

Cybersecurity weekly: Do U.S. Freelancers Need SOC 2? Security Requirements Clients Now Expect

1
Comments
2 min read
What Happens If Client Data Is Exposed? (U.S. Laws Made Simple)
Cover image for What Happens If Client Data Is Exposed? (U.S. Laws Made Simple)

What Happens If Client Data Is Exposed? (U.S. Laws Made Simple)

Comments
2 min read