DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Command Injection in Laravel: How to Detect & Prevent It

Command Injection in Laravel: How to Detect & Prevent It

6
Comments
3 min read
Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites

Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites

Comments
3 min read
New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

13
Comments
5 min read
Decompiling and Debugging with Ghidra

Decompiling and Debugging with Ghidra

12
Comments
4 min read
Conhecendo OSINT

Conhecendo OSINT

1
Comments
3 min read
Quitting After a Decade In: Lessons I am Carrying Over

Quitting After a Decade In: Lessons I am Carrying Over

1
Comments
7 min read
🚨 Advanced SQL Injection: Exploitation Techniques & Prevention Strategies 🚀

🚨 Advanced SQL Injection: Exploitation Techniques & Prevention Strategies 🚀

5
Comments
3 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
Data Protection, Privacy, and Ethics in the Data driven Age

Data Protection, Privacy, and Ethics in the Data driven Age

Comments
3 min read
Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

2
Comments
2 min read
The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance

The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance

Comments
2 min read
Preventing Race Conditions in Laravel Applications

Preventing Race Conditions in Laravel Applications

3
Comments
3 min read
Docker Security: Essential Practices for Securing Your Containers

Docker Security: Essential Practices for Securing Your Containers

4
Comments
3 min read
Some data breach just exposed 50 million students

Some data breach just exposed 50 million students

Comments
2 min read
Introducing AsmJamShield: A Professional-Grade Cybersecurity Tool

Introducing AsmJamShield: A Professional-Grade Cybersecurity Tool

5
Comments
3 min read
What to Expect in 2025?

What to Expect in 2025?

Comments 1
9 min read
Quantum Threat: Will Quantum Computers Break Crypto?

Quantum Threat: Will Quantum Computers Break Crypto?

Comments
4 min read
Fix Insufficient TLS in Laravel: Guide with Free Security Tools

Fix Insufficient TLS in Laravel: Guide with Free Security Tools

2
Comments
3 min read
The Urgent Case for Government Cloud Adoption: Modernizing Digital Infrastructure

The Urgent Case for Government Cloud Adoption: Modernizing Digital Infrastructure

2
Comments
4 min read
Data Privacy and Ethics: How to Safeguard User Data and Build Trust

Data Privacy and Ethics: How to Safeguard User Data and Build Trust

Comments
3 min read
Securing Applications with Threat Modelling:A Developer’s Guide to PyTM

Securing Applications with Threat Modelling:A Developer’s Guide to PyTM

3
Comments
4 min read
Which is the Best Course for Ethical Hacking?

Which is the Best Course for Ethical Hacking?

1
Comments
4 min read
CORS Misconfigurations in Laravel: Risks and Fixes

CORS Misconfigurations in Laravel: Risks and Fixes

2
Comments
3 min read
Breaking Down the OSI Model: A Cybersecurity Perspective

Breaking Down the OSI Model: A Cybersecurity Perspective

5
Comments 1
3 min read
Automating Container Security: Building Self-Healing Systems with Docker Scout and DevSecOps Best Practices

Automating Container Security: Building Self-Healing Systems with Docker Scout and DevSecOps Best Practices

5
Comments
3 min read
loading...