DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Recent Web Vulnerabilities and How LLMs and DCS Can Help Combat Them!

Recent Web Vulnerabilities and How LLMs and DCS Can Help Combat Them!

1
Comments
2 min read
Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

1
Comments
3 min read
Phishing And Malware - A Practical Dive

Phishing And Malware - A Practical Dive

5
Comments
3 min read
How to detect wildcard security vulnerabilities

How to detect wildcard security vulnerabilities

1
Comments
3 min read
End Of Series: SQL Injection Detect & Defend

End Of Series: SQL Injection Detect & Defend

5
Comments 1
1 min read
DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

Comments
6 min read
Mastering SSH Tunneling: A Guide to Securing Your Network Traffic

Mastering SSH Tunneling: A Guide to Securing Your Network Traffic

8
Comments
4 min read
How to Prevent SQL Injection with SafeLine WAF

How to Prevent SQL Injection with SafeLine WAF

8
Comments
2 min read
Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

5
Comments
3 min read
Part 5: SQL Injection Series: Future Trends and Emerging Challenges

Part 5: SQL Injection Series: Future Trends and Emerging Challenges

5
Comments
4 min read
Part 6: SQL Injection Series: Case Studies and Lessons Learned

Part 6: SQL Injection Series: Case Studies and Lessons Learned

9
Comments
4 min read
Part 8: SQL Injection Series - Advanced Prevention Techniques and Real-World Applications

Part 8: SQL Injection Series - Advanced Prevention Techniques and Real-World Applications

6
Comments
2 min read
The Impact of AI on Creative Industries

The Impact of AI on Creative Industries

10
Comments
6 min read
Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

5
Comments
4 min read
Implications for Encryption and Cybersecurity with Quantum Computing

Implications for Encryption and Cybersecurity with Quantum Computing

Comments
4 min read
Wireless Security Configuration: Protect Your Network Now!

Wireless Security Configuration: Protect Your Network Now!

Comments
3 min read
Fix Security Misconfigurations in Laravel for Safer Web Apps

Fix Security Misconfigurations in Laravel for Safer Web Apps

Comments
3 min read
Caught in the Crunch My Journey from Snacks to 2 Million Exposed Users Privacy

Caught in the Crunch My Journey from Snacks to 2 Million Exposed Users Privacy

17
Comments
3 min read
Creating a Simple a Virus using Python

Creating a Simple a Virus using Python

11
Comments
4 min read
Celebrating 10,000 Followers on DEV.to – A Journey of Learning and Growth[Must Read]

Celebrating 10,000 Followers on DEV.to – A Journey of Learning and Growth[Must Read]

5
Comments
3 min read
How to Detect and Defend Against SQL Injection Attacks - Part 3[Must Read]

How to Detect and Defend Against SQL Injection Attacks - Part 3[Must Read]

5
Comments
4 min read
Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

13
Comments 1
4 min read
Unmasking the Invisible: Wireshark and the Art of Network Analysis

Unmasking the Invisible: Wireshark and the Art of Network Analysis

2
Comments
3 min read
The Transformative Role of AI in Ridesharing Security

The Transformative Role of AI in Ridesharing Security

2
Comments
3 min read
Top 12 DevSecOps Tools for 2025

Top 12 DevSecOps Tools for 2025

2
Comments
10 min read
loading...