DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Mastering HTTP: A Practical Guide for Developers & Cybersecurity Enthusiasts

Mastering HTTP: A Practical Guide for Developers & Cybersecurity Enthusiasts

Comments
4 min read
Quantum Key Distribution: A Beginner’s Guide

Quantum Key Distribution: A Beginner’s Guide

Comments
15 min read
How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

Comments
6 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
Construindo um Sistema de Presença e Autenticação usando Reconhecimento Facial com FaceIO e JavaScript

Construindo um Sistema de Presença e Autenticação usando Reconhecimento Facial com FaceIO e JavaScript

1
Comments
7 min read
The $500K Tool That Got Me a Cease-and-Desist from 𝕏

The $500K Tool That Got Me a Cease-and-Desist from 𝕏

Comments
4 min read
How to Ensure AWS S3 Bucket Security Best Practices

How to Ensure AWS S3 Bucket Security Best Practices

1
Comments
1 min read
Top AWS Services Every Cloud Computing Professional Should Know

Top AWS Services Every Cloud Computing Professional Should Know

Comments
4 min read
Prevent Subdomain Takeover in Laravel: A Dev’s Guide

Prevent Subdomain Takeover in Laravel: A Dev’s Guide

2
Comments
3 min read
Detecting Homoglyph Attacks with Toolzr’s Character Identifier

Detecting Homoglyph Attacks with Toolzr’s Character Identifier

4
Comments
2 min read
Best Cisco Training: A Complete Guide to Advancing Your Networking Career

Best Cisco Training: A Complete Guide to Advancing Your Networking Career

Comments
3 min read
Information Warfare and Game Theory: A Cybersecurity Perspective

Information Warfare and Game Theory: A Cybersecurity Perspective

Comments
2 min read
The Future of Quantum Computing in Blockchain

The Future of Quantum Computing in Blockchain

1
Comments
6 min read
Importance of Timely Security Patching in Software Maintenance

Importance of Timely Security Patching in Software Maintenance

Comments
2 min read
Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 2)

Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 2)

Comments
4 min read
Guardius: Organizing your resources with Environments, Projects, and Tasks

Guardius: Organizing your resources with Environments, Projects, and Tasks

Comments
3 min read
Advanced Ethical Hacking Course Syllabus 2025

Advanced Ethical Hacking Course Syllabus 2025

Comments
3 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

1
Comments
1 min read
LDAP Injection in Laravel: Prevention & Secure Coding

LDAP Injection in Laravel: Prevention & Secure Coding

2
Comments
3 min read
SSH Security Boost: Implementing Port Knocking to Block Unauthorized Access

SSH Security Boost: Implementing Port Knocking to Block Unauthorized Access

Comments
3 min read
My Journey with SafeLine: A Practical Tool for Web Security

My Journey with SafeLine: A Practical Tool for Web Security

5
Comments
2 min read
How I Conquered the CISSP Exam

How I Conquered the CISSP Exam

Comments
2 min read
SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

SafeLine WAF: A Powerful and User-Friendly Web Application Firewall

5
Comments
2 min read
Why Virtual Training with Microsoft Certified Trainers is a Game-Changer for Microsoft 365 Certification

Why Virtual Training with Microsoft Certified Trainers is a Game-Changer for Microsoft 365 Certification

Comments
2 min read
How to protect yourself against cyber threats

How to protect yourself against cyber threats

Comments
3 min read
loading...