DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
Cyberattack Downtime Costs by Industry: Why Every Minute Matters

Cyberattack Downtime Costs by Industry: Why Every Minute Matters

Comments
7 min read
7 Best Resources to Learn Cybersecurity: A Dev’s Journey from Zero to Hero

7 Best Resources to Learn Cybersecurity: A Dev’s Journey from Zero to Hero

2
Comments
4 min read
Anthropic Discloses First AI-Orchestrated Cyber Espionage Campaign

Anthropic Discloses First AI-Orchestrated Cyber Espionage Campaign

Comments
5 min read
File Upload Security Issues

File Upload Security Issues

Comments
5 min read
19,400+ GitHub Stars: This Free WAF Is on Fire

19,400+ GitHub Stars: This Free WAF Is on Fire

Comments
3 min read
Deploy SafeLine WAF with Docker Compose: A Step-by-Step Guide

Deploy SafeLine WAF with Docker Compose: A Step-by-Step Guide

Comments
3 min read
Authorization for MCP: OAuth 2.1, PRMs, and Best Practices

Authorization for MCP: OAuth 2.1, PRMs, and Best Practices

Comments
6 min read
Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Comments
2 min read
$2,300 Kill Switch: How One Hacker Saved a Headset and Broke a Tesla

$2,300 Kill Switch: How One Hacker Saved a Headset and Broke a Tesla

9
Comments 2
3 min read
AI Threat Detection for EU SMEs

AI Threat Detection for EU SMEs

Comments
6 min read
Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Comments
2 min read
How an Independent Website Secured Its Business with SafeLine WAF

How an Independent Website Secured Its Business with SafeLine WAF

Comments
3 min read
Security Analytics with Machine Learning

Security Analytics with Machine Learning

1
Comments 1
5 min read
Building a Free Port Scanner with Python, Flask, and Nmap 🛡️

Building a Free Port Scanner with Python, Flask, and Nmap 🛡️

Comments
2 min read
Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication

Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication

1
Comments
2 min read
How to Build an Unstoppable Service: The L-Security Cloud Tank Architecture

How to Build an Unstoppable Service: The L-Security Cloud Tank Architecture

5
Comments
3 min read
My Cybersecurity Homelab: A Hands-On Journey into Defensive and Offensive Operations

My Cybersecurity Homelab: A Hands-On Journey into Defensive and Offensive Operations

1
Comments
4 min read
Best Practices for Hardening Enterprise Linux Servers and Enhancing Cloud Security

Best Practices for Hardening Enterprise Linux Servers and Enhancing Cloud Security

Comments
3 min read
Ditch Cloud WAFs: How to Migrate to Self-Hosted SafeLine WAF with Zero Downtime

Ditch Cloud WAFs: How to Migrate to Self-Hosted SafeLine WAF with Zero Downtime

5
Comments
3 min read
Deploy SafeLine WAF in 10 Minutes: A DevOps-Friendly Quick Start

Deploy SafeLine WAF in 10 Minutes: A DevOps-Friendly Quick Start

Comments
3 min read
Stopping Bots in Action: SafeLine WAF Real-World Traffic Case Study

Stopping Bots in Action: SafeLine WAF Real-World Traffic Case Study

Comments
2 min read
Azure Secure Score Guide for Cloud Security

Azure Secure Score Guide for Cloud Security

2
Comments
4 min read
Sealed Box AI: A Runbook for Owning Your Own Local-Only AI Stack

Sealed Box AI: A Runbook for Owning Your Own Local-Only AI Stack

Comments 1
3 min read
Effortless SafeLine Updates: One Script to Rule Them All

Effortless SafeLine Updates: One Script to Rule Them All

Comments
2 min read
loading...