Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
cyberattacks
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
VM Safety Configuration: A Developer's Guide
Rita Kairu
Rita Kairu
Rita Kairu
Follow
Oct 16 '25
VM Safety Configuration: A Developer's Guide
#
cybersecurity
#
cyberattacks
#
malware
#
ai
Comments
Add Comment
6 min read
Don't Run That Code! Your Guide to Staying Safe from Job Scams with Virtual Machines
Rita Kairu
Rita Kairu
Rita Kairu
Follow
Oct 16 '25
Don't Run That Code! Your Guide to Staying Safe from Job Scams with Virtual Machines
#
cybersecurity
#
cyberattacks
#
softwareengineering
#
ai
Comments
Add Comment
3 min read
Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 29 '25
Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks
#
xss
#
cyberattacks
#
cybersecurity
#
crosssitescription
Comments
Add Comment
7 min read
Understanding Session Hijacking: Detection, Prevention, and Mitigation
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 29 '25
Understanding Session Hijacking: Detection, Prevention, and Mitigation
#
hijacking
#
cyberattacks
#
cybersecurity
#
sessionhijacking
Comments
Add Comment
6 min read
What is a Denial of Service (DoS) Attack? A Comprehensive Guide
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 29 '25
What is a Denial of Service (DoS) Attack? A Comprehensive Guide
#
dosattack
#
cybersecurity
#
cyberattacks
#
dos
Comments
Add Comment
8 min read
Understanding Brute Force Attacks: A Simple Guide to Protecting Your Digital Security
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 29 '25
Understanding Brute Force Attacks: A Simple Guide to Protecting Your Digital Security
#
bruteforceattack
#
cyberattacks
#
cybersecurity
#
bruteforce
Comments
Add Comment
5 min read
Understanding Spear Phishing: How to Protect Yourself from Targeted Cyber Attacks
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 28 '25
Understanding Spear Phishing: How to Protect Yourself from Targeted Cyber Attacks
#
cybersecurity
#
cyberattacks
#
phishing
#
spearphishing
Comments
Add Comment
8 min read
16 VPS Security Tips to Protect Your Linux Server
Minima Desk
Minima Desk
Minima Desk
Follow
Apr 11 '25
16 VPS Security Tips to Protect Your Linux Server
#
vpssecurity
#
linuxserver
#
cyberattacks
#
securitytips
1
 reaction
Comments
Add Comment
6 min read
How to Stay Safe from Cyber Attacks: Tips Anyone Can Follow
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
May 30 '25
How to Stay Safe from Cyber Attacks: Tips Anyone Can Follow
#
cybersecurity
#
security
#
tutorial
#
cyberattacks
Comments
Add Comment
4 min read
Common Types of Cyber Attacks and How to Prevent Them
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Jun 1 '25
Common Types of Cyber Attacks and How to Prevent Them
#
cybersecurity
#
cyberattacks
#
tutorial
#
cyber
Comments
Add Comment
3 min read
DNS Flood Attack vs. DDoS
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Aug 19 '25
DNS Flood Attack vs. DDoS
#
dns
#
ddos
#
cyberattacks
#
infosectrain
1
 reaction
Comments
Add Comment
3 min read
Man-in-the-Middle (MitM) Attacks: Types, Detection, and Prevention Tips
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 29 '25
Man-in-the-Middle (MitM) Attacks: Types, Detection, and Prevention Tips
#
mitm
#
cybersecurity
#
cyberattacks
#
maninthemiddle
Comments
Add Comment
7 min read
GhostGPT: An Uncensored AI Chatbot Empowering Cybercriminals
Deepak Gupta
Deepak Gupta
Deepak Gupta
Follow
Mar 11 '25
GhostGPT: An Uncensored AI Chatbot Empowering Cybercriminals
#
aiartificialintellig
#
hacking
#
cyberattacks
#
cybersecurity
1
 reaction
Comments
Add Comment
10 min read
Why Cyber Insurance Is Becoming Critical in the Age of AI-Powered Threats
Varsha Nair
Varsha Nair
Varsha Nair
Follow
Jun 11 '25
Why Cyber Insurance Is Becoming Critical in the Age of AI-Powered Threats
#
cybersecurity
#
cyberattacks
#
ai
Comments
1
 comment
1 min read
21 Common Types of Cyberattacks and How to Prevent Them
Metana
Metana
Metana
Follow
Sep 26 '25
21 Common Types of Cyberattacks and How to Prevent Them
#
cyberattacks
#
cybersecurity
Comments
Add Comment
40 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account