DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding SQL Injection: A Major Security Threat

Understanding SQL Injection: A Major Security Threat

13
Comments
3 min read
How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

4
Comments
6 min read
Detecting Homoglyph Attacks with Toolzr’s Character Identifier

Detecting Homoglyph Attacks with Toolzr’s Character Identifier

4
Comments
2 min read
Cyber skill chain

Cyber skill chain

1
Comments
5 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

1
Comments
1 min read
Construindo um Sistema de Presença e Autenticação usando Reconhecimento Facial com FaceIO e JavaScript

Construindo um Sistema de Presença e Autenticação usando Reconhecimento Facial com FaceIO e JavaScript

2
Comments
7 min read
Information Warfare and Game Theory: A Cybersecurity Perspective

Information Warfare and Game Theory: A Cybersecurity Perspective

Comments
2 min read
5 Web Security Flaws That Keep Security Experts Awake at Night: A Journey Through the Dark Side of Web Development

5 Web Security Flaws That Keep Security Experts Awake at Night: A Journey Through the Dark Side of Web Development

Comments
6 min read
10 Cyber Security & SSL Predictions for 2025

10 Cyber Security & SSL Predictions for 2025

Comments
11 min read
Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 2)

Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 2)

Comments
4 min read
Defending OAuth2: Advanced Tactics to Block Replay Attacks

Defending OAuth2: Advanced Tactics to Block Replay Attacks

Comments
3 min read
Kickstarting Your Cybersecurity Journey: A Beginner’s Guide

Kickstarting Your Cybersecurity Journey: A Beginner’s Guide

Comments
5 min read
Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 1)

Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 1)

1
Comments
6 min read
Recon v2: Um curto update sobre como estou mudando meu processo de recon

Recon v2: Um curto update sobre como estou mudando meu processo de recon

7
Comments
3 min read
WHAT IF #5: Every Social Media Algorithm Was Removed?

WHAT IF #5: Every Social Media Algorithm Was Removed?

11
Comments 2
2 min read
Detailed Guide to Mastering OverTheWire Bandit Game

Detailed Guide to Mastering OverTheWire Bandit Game

3
Comments
9 min read
LDAP Injection in Laravel: Prevention & Secure Coding

LDAP Injection in Laravel: Prevention & Secure Coding

2
Comments
3 min read
Deepfake Technology and Cybersecurity

Deepfake Technology and Cybersecurity

5
Comments
5 min read
Automate Port Knocking with Dynamic Port Rotation for Secure SSH Access

Automate Port Knocking with Dynamic Port Rotation for Secure SSH Access

2
Comments
3 min read
SSH Security Boost: Implementing Port Knocking to Block Unauthorized Access

SSH Security Boost: Implementing Port Knocking to Block Unauthorized Access

Comments
3 min read
Pyramid Of Pain

Pyramid Of Pain

1
Comments
2 min read
Market Trends in AI And CyberSecurity in 2025.

Market Trends in AI And CyberSecurity in 2025.

2
Comments 2
3 min read
Cloud Security Best Practice: A Blueprint for Securing Your Cloud Enviroment

Cloud Security Best Practice: A Blueprint for Securing Your Cloud Enviroment

1
Comments
3 min read
🔒Network Security and Threats: Protecting the Digital World

🔒Network Security and Threats: Protecting the Digital World

1
Comments
2 min read
Locking Down Your Cloud-Native App with Snyk

Locking Down Your Cloud-Native App with Snyk

Comments
2 min read
loading...